Sciweavers

794 search results - page 123 / 159
» Automatically Analyzing Software Processes: Experience Repor...
Sort
View
111
Voted
ICNP
2006
IEEE
15 years 6 months ago
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL
— This paper reports on an experiment in network protocol design: we use novel rigorous techniques in the design process of a new protocol, in a close collaboration between syste...
Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ri...
110
Voted
ISMIS
2005
Springer
15 years 6 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
AINA
2010
IEEE
15 years 5 months ago
CAPTCHA Using Strangeness in Machine Translation
— CAPTCHA is a technique that is used to prevent automatic programs from being able to acquire free e-mail or online service accounts. However, as many researchers have already r...
Takumi Yamamoto, J. Doug Tygar, Masakatsu Nishigak...
CSL
2010
Springer
15 years 18 days ago
Evaluation of a hierarchical reinforcement learning spoken dialogue system
We describe an evaluation of spoken dialogue strategies designed using hierarchical reinforcement learning agents. The dialogue strategies were learnt in a simulated environment a...
Heriberto Cuayáhuitl, Steve Renals, Oliver ...
86
Voted
ISCAS
2008
IEEE
120views Hardware» more  ISCAS 2008»
15 years 7 months ago
A baseball exploration system using spatial pattern recognition
— Despite a lot of research efforts in baseball video processing, little work has been done in analyzing the detailed process and ball movement of the batting content. This paper...
Hua-Tsiing Chen, Ming-Ho Hsiao, Hsuan-Sheng Chen, ...