Sciweavers

933 search results - page 132 / 187
» Clustering Categorical Data: An Approach Based on Dynamical ...
Sort
View
RAID
2007
Springer
15 years 3 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
AH
2006
Springer
15 years 1 months ago
A Comparative Study of Compound Critique Generation in Conversational Recommender Systems
Abstract. Critiquing techniques provide an easy way for users to feedback their preferences over one or several attributes of the products in a conversational recommender system. W...
Jiyong Zhang, Pearl Pu
VR
2000
IEEE
103views Virtual Reality» more  VR 2000»
15 years 2 months ago
Extending Locales: Awareness Management in MASSIVE-3
Locales (as first embodied in the SPLINE system) are a very good approach to constructing and organising large virtual environments, especially for distributed and multiuser syste...
Jim Purbrick, Chris Greenhalgh
RWEB
2007
Springer
15 years 3 months ago
Reactive Rules on the Web
Reactive rules are used for programming rule-based, reactive systems, which have the ability to detect events and respond to them automatically in a timely manner. Such systems are...
Bruno Berstel, Philippe Bonnard, François B...
ACL
2010
14 years 7 months ago
Learning 5000 Relational Extractors
Many researchers are trying to use information extraction (IE) to create large-scale knowledge bases from natural language text on the Web. However, the primary approach (supervis...
Raphael Hoffmann, Congle Zhang, Daniel S. Weld