Sciweavers

2738 search results - page 311 / 548
» Evaluating Discourse Processing Algorithms
Sort
View
ICNC
2005
Springer
15 years 7 months ago
Applying Genetic Programming to Evolve Learned Rules for Network Anomaly Detection
The DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set is the most widely used public benchmark for testing intrusion detection systems. But the presence...
Chuanhuan Yin, Shengfeng Tian, Houkuan Huang, Jun ...
IJCNLP
2004
Springer
15 years 7 months ago
Deterministic Dependency Structure Analyzer for Chinese
In this paper, we present a deterministic dependency structure analyzer for Chinese. This analyzer implements two algorithms – Yamada and Nivre models – and two sorts of class...
Yuchang Cheng, Masayuki Asahara, Yuji Matsumoto
ISI
2004
Springer
15 years 7 months ago
Semantic Analysis for Monitoring Insider Threats
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
ISPA
2004
Springer
15 years 7 months ago
Location-Dependent Query Results Retrieval in a Multi-cell Wireless Environment
The demand of information services is popular in recent years. However, the requested of correct answer in a mobile environment needs to have more attentions. This is due to the sc...
James Jayaputera, David Taniar
VLDB
2004
ACM
203views Database» more  VLDB 2004»
15 years 7 months ago
PLACE: A Query Processor for Handling Real-time Spatio-temporal Data Streams
The emergence of location-aware services calls for new real-time spatio-temporal query processing algorithms that deal with large numbers of mobile objects and queries. In this de...
Mohamed F. Mokbel, Xiaopeng Xiong, Walid G. Aref, ...