Sciweavers

1807 search results - page 60 / 362
» Backdoors in the Context of Learning
Sort
View
RAID
2007
Springer
15 years 3 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
CICLING
2005
Springer
15 years 3 months ago
Incremental Information Extraction Using Tree-Based Context Representations
Abstract. The purpose of information extraction (IE) is to find desired pieces of information in natural language texts and store them in a form that is suitable for automatic pro...
Christian Siefkes
MHCI
2005
Springer
15 years 3 months ago
ContextContacts: re-designing SmartPhone's contact book to support mobile awareness and collaboration
Acontextuality of the mobile phone often leads to a caller’s uncertainty over a callee’s current state, which in turn often hampers mobile collaboration. We are interested in ...
Antti Oulasvirta, Mika Raento, Sauli Tiitta
ICWL
2004
Springer
15 years 3 months ago
Context-Based Classification for Link Data
In Web-based e-learning, an up-to-date catalogue of subject-specific Web resources can effectively offer inexperienced students with an advanced academic portal on the Web. To auto...
YongHong Tian, Wen Gao, Tiejun Huang
ASSETS
2007
ACM
15 years 1 months ago
SIBYLLE: a system for alternative communication adapting to the context and its user
In this paper, we describe the latest version of SIBYLLE, an AAC system that permits persons suffering from severe physical disabilities to enter text with any computer applicatio...
Tonio Wandmacher, Jean-Yves Antoine, Franck Poirie...