Sciweavers

1581 search results - page 101 / 317
» Domain semantics of possibility computations
Sort
View
135
Voted
ICARIS
2007
Springer
15 years 7 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
104
Voted
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 4 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
103
Voted
SIGLEX
1991
15 years 4 months ago
Lexicon, Ontology, and Text Meaning
A computationally relevant theory of lexical semantics must take into consideration both the form and the content of three different static knowledge sources -- the lexicon, the o...
Boyan A. Onyshkevych, Sergei Nirenburg
CORR
2007
Springer
135views Education» more  CORR 2007»
15 years 24 days ago
Automatically Restructuring Practice Guidelines using the GEM DTD
This paper describes a system capable of semi-automatically filling an XML template from free texts in the clinical domain (practice guidelines). The XML template includes semanti...
Amanda Bouffier, Thierry Poibeau
142
Voted
SDMW
2010
Springer
14 years 10 months ago
Computationally Efficient Searchable Symmetric Encryption
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little ...
Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, P...