Sciweavers

4469 search results - page 649 / 894
» Comparing and Combining Profiles
Sort
View
ISSA
2008
15 years 6 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
126
Voted
LREC
2008
85views Education» more  LREC 2008»
15 years 6 months ago
Lexicon, Grammar, and Multilinguality in the Japanese FrameNet
This paper discusses findings of a frame-based contrastive text analysis, using the large-scale and precise descriptions of semantic frames provided by the FrameNet project (Baker...
Kyoko Ohara
IWRT
2007
167views Communications» more  IWRT 2007»
15 years 6 months ago
The Practicality of Multi-Tag RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Successful object identification is the primary o...
Leonid Bolotnyy, Scott Krize, Gabriel Robins
147
Voted
MOBIMEDIA
2007
15 years 6 months ago
Cooperative caching in wireless multimedia sensor networks
The recent advances in miniaturization and the creation of low-power circuits, combined with small-sized batteries have made the development of wireless sensor networks a working ...
Nikos Dimokas, Dimitrios Katsaros, Yannis Manolopo...
NAACL
2007
15 years 6 months ago
To Memorize or to Predict: Prominence labeling in Conversational Speech
The immense prosodic variation of natural conversational speech makes it challenging to predict which words are prosodically prominent in this genre. In this paper, we examine a n...
Ani Nenkova, Jason Brenier, Anubha Kothari, Sasha ...