Sciweavers

5684 search results - page 326 / 1137
» Computing with active dendrites
Sort
View
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 5 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
PERCOM
2006
ACM
16 years 4 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste
MOBIQUITOUS
2005
IEEE
15 years 10 months ago
An ECA-P Policy-based Framework for Managing Ubiquitous Computing Environments
Ubiquitous Computing Environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds o...
Chetan Shiva Shankar, Anand Ranganathan, Roy H. Ca...
145
Voted
MM
2005
ACM
111views Multimedia» more  MM 2005»
15 years 10 months ago
A flexible system for creating music while interacting with the computer
Music is a very important part of our lives. People enjoy listening to the music, and many of us find a special pleasure in creating the music. Computers further extended many asp...
Zeljko Obrenovic
BMCBI
2008
100views more  BMCBI 2008»
15 years 5 months ago
Hotspot Hunter: a computational system for large-scale screening and selection of candidate immunological hotspots in pathogen p
Background: T-cell epitopes that promiscuously bind to multiple alleles of a human leukocyte antigen (HLA) supertype are prime targets for development of vaccines and immunotherap...
Guanglan Zhang, Asif M. Khan, Kellathur N. Sriniva...