Sciweavers

27827 search results - page 5253 / 5566
» Generating
Sort
View
DBSEC
2006
131views Database» more  DBSEC 2006»
15 years 4 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
130
Voted
DIMVA
2006
15 years 4 months ago
Using Static Program Analysis to Aid Intrusion Detection
Abstract. The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line servic...
Manuel Egele, Martin Szydlowski, Engin Kirda, Chri...
145
Voted
DLOG
2006
15 years 4 months ago
Tableau Caching for Description Logics with Inverse and Transitive Roles
Abstract. Modern description logic (DL) reasoners are known to be less efficient for DLs with inverse roles. The current loss of performance is largely due to the missing applicabi...
Yu Ding, Volker Haarslev
141
Voted
DMIN
2006
131views Data Mining» more  DMIN 2006»
15 years 4 months ago
Use of Data Mining to Determine Cheating in Online Student Assessment
are proposing a model to help organizations detect and prevent cheats in online assessments. First we analyze different student personalities, stress situations generated by onlin...
Alberto Ochoa, Amol Wagholikar
FLAIRS
2004
15 years 4 months ago
Recurrent Neural Networks and Pitch Representations for Music Tasks
We present results from experiments in using several pitch representations for jazz-oriented musical tasks performed by a recurrent neural network. We have run experiments with se...
Judy A. Franklin
« Prev « First page 5253 / 5566 Last » Next »