Sciweavers

2175 search results - page 257 / 435
» From Human Knowledge to Process Models
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 8 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
CSB
2004
IEEE
115views Bioinformatics» more  CSB 2004»
15 years 7 months ago
PoPS: A Computational Tool for Modeling and Predicting Protease Specificity
Proteases play a fundamental role in the control of intra- and extracellular processes by binding and cleaving specific amino acid sequences. Identifying these targets is extremel...
Sarah E. Boyd, Maria J. García de la Banda,...
IC
2007
15 years 5 months ago
Gordon Surface Modeling in a Network Environment
—With the advent of the Internet, we have entered the age of ubiquitous systems that will need to be able to communicate, establish criteria for measurement and then perform thes...
Jan Smid, Petr Volf
JITE
2006
106views more  JITE 2006»
15 years 3 months ago
The Information Technology Model Curriculum
The last twenty years has seen the development of demand for a new type of computing professional, which has resulted in the emergence of the academic discipline of Information Te...
Joseph J. Ekstrom, Sandra Gorka, Reza Kamali, Eydi...
JAIR
2010
142views more  JAIR 2010»
15 years 2 months ago
Context-based Word Acquisition for Situated Dialogue in a Virtual World
To tackle the vocabulary problem in conversational systems, previous work has applied unsupervised learning approaches on co-occurring speech and eye gaze during interaction to au...
Shaolin Qu, Joyce Yue Chai