Sciweavers

776 search results - page 147 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
IJCAI
2003
15 years 1 months ago
Bayesian Information Extraction Network
Dynamic Bayesian networks (DBNs) offer an elegant way to integrate various aspects of language in one model. Many existing algorithms developed for learning and inference in DBNs ...
Leonid Peshkin, Avi Pfeffer
AIRWEB
2007
Springer
15 years 5 months ago
Computing Trusted Authority Scores in Peer-to-Peer Web Search Networks
Peer-to-peer (P2P) networks have received great attention for sharing and searching information in large user communities. The open and anonymous nature of P2P networks is one of ...
Josiane Xavier Parreira, Debora Donato, Carlos Cas...
104
Voted
IJFCS
2006
130views more  IJFCS 2006»
14 years 11 months ago
Mealy multiset automata
We introduce the networks of Mealy multiset automata, and study their computational power. The networks of Mealy multiset automata are computationally complete. 1 Learning from Mo...
Gabriel Ciobanu, Viorel Mihai Gontineac
SAC
2010
ACM
15 years 6 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
107
Voted
CISSE
2008
Springer
15 years 23 days ago
Secondary Emotions Deduction from Context
— Human centred services are increasingly common in the market of mobile devices. However, affective aware services are still scarce. In turn, the recognition of secondary emotio...
Kuderna-Iulian Benta, Marcel Cremene, Nicoleta Ram...