Sciweavers

458 search results - page 71 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
112
Voted
ICPR
2008
IEEE
16 years 3 months ago
Evolving boundary detectors for natural images via Genetic Programming
Boundary detection constitutes a crucial step in many computer vision tasks. We present a novel learning approach to automatically construct a boundary detector for natural images...
Ilan Kadar, Moshe Sipper, Ohad Ben-Shahar
CIKM
2005
Springer
15 years 7 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
ACL
2000
15 years 3 months ago
Inducing Probabilistic Syllable Classes Using Multivariate Clustering
An approach to automatic detection of syllable structure is presented. We demonstrate a novel application of EM-based clustering to multivariate data, exempli ed by the induction ...
Karin Müller, Bernd Möbius, Detlef Presc...
SKG
2006
IEEE
15 years 8 months ago
Security Attack Ontology for Web Services
Web services (WS) have become a significant part of the Web because of such attractive features as simple to use, platform independence, and XML/SOAP support. However, these featu...
Artem Vorobiev, Jun Han
AIHC
2007
Springer
15 years 8 months ago
Affect Detection and an Automated Improvisational AI Actor in E-Drama
Enabling machines to understand emotions and feelings of the human users in their natural language textual input during interaction is a challenging issue in Human Computing. Our w...
Li Zhang, Marco Gillies, John A. Barnden, Robert J...