Sciweavers

1170 search results - page 86 / 234
» Experience with Ripple-Down Rules
Sort
View
SAINT
2008
IEEE
15 years 8 months ago
ROOK: Multi-session Based Network Security Event Detector
We have implemented Multi-Session based Network Security Event Detector: ROOK to detect botnet activity and P2P file sharing traffic and our results show that our method is less...
Masayoshi Mizutani, Shin Shirahata, Masaki Minami,...
CEC
2007
IEEE
15 years 8 months ago
Comparing bio-inspired algorithms in constrained optimization problems
Abstract— This paper presents a comparison of four bioinspired algorithms (all seen as search engines) with a similar constraint-handling mechanism (Deb’s feasibility rules) to...
Efrén Mezura-Montes, Blanca Cecilia Lopez-R...
104
Voted
IAT
2007
IEEE
15 years 8 months ago
Investigating User Browsing Behavior
This paper describes our efforts to investigate factors in user browsing behavior to automatically evaluate Web pages that the user shows interest in. We developed a client site l...
Ganesan Velayathan, Seiji Yamada
ICTAI
2007
IEEE
15 years 8 months ago
A Methodology for Reader's Emotional State Extraction to Augment Expressions in Speech Synthesis
This paper presents a methodology for the real-time extraction of readers’ emotional state from documents as well as the representation of emotionally annotated documents into a...
Dimitrios Tsonos, Gerasimos Xydas, Georgios Kourou...
EPIA
2007
Springer
15 years 8 months ago
Modelling Morality with Prospective Logic
This paper shows how moral decisions can be drawn computationally by using prospective logic programs. These are employed to model moral dilemmas, as they are able to prospectively...
Luís Moniz Pereira, Ari Saptawijaya