Sciweavers

1804 search results - page 249 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
EWCBR
1998
Springer
15 years 2 months ago
WWW Assisted Browsing by Reusing Past Navigations of a Group of Users
In this paper, we present our case-based browsing advisor for the Web, called BROADWAY. BROADWAY follows a group of users during their navigations and supports an indirect collabor...
Michel Jaczynski, Brigitte Trousse
VIP
2003
14 years 11 months ago
Screen Capture - A Vector Quantisation Approach
Over the last couple of decades, more and more presentations are done on computer screen. The need to store or broadcast such presentation efficiently is in high demand across dif...
Jesse S. Jin, Sue R. Wu
INFOCOM
2009
IEEE
15 years 4 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
WWW
2003
ACM
15 years 10 months ago
?-Queries: enabling querying for semantic associations on the semantic web
This paper presents the notion of Semantic Associations as complex relationships between resource entities. These relationships capture both a connectivity of entities as well as ...
Kemafor Anyanwu, Amit P. Sheth
ICRA
2009
IEEE
137views Robotics» more  ICRA 2009»
15 years 4 months ago
Continuous vocal imitation with self-organized vowel spaces in Recurrent Neural Network
Abstract— A continuous vocal imitation system was developed using a computational model that explains the process of phoneme acquisition by infants. Human infants perceive speech...
Hisashi Kanda, Tetsuya Ogata, Toru Takahashi, Kazu...