Sciweavers

877 search results - page 163 / 176
» Intrusion detection systems as evidence
Sort
View
CLEF
2008
Springer
15 years 3 months ago
Overview of the Answer Validation Exercise 2008
The Answer Validation Exercise at the Cross Language Evaluation Forum (CLEF) is aimed at developing systems able to decide whether the answer of a Question Answering (QA) system i...
Álvaro Rodrigo, Anselmo Peñas, Felis...

Publication
237views
14 years 3 months ago
Estimation of behavioral user state based on eye gaze and head pose—application in an e-learning environment
Most e-learning environments which utilize user feedback or profiles, collect such information based on questionnaires, resulting very often in incomplete answers, and sometimes de...
Stylianos Asteriadis, Paraskevi Tzouveli, Kostas K...
112
Voted
CCS
2007
ACM
15 years 7 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
131
Voted
ESE
2008
112views Database» more  ESE 2008»
15 years 1 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
AGENTS
2000
Springer
15 years 6 months ago
Towards a fault-tolerant multi-agent system architecture
Multi-agent systems are prone to failures typical of any distributed system. Agents and resources may become unavailable due to machine crashes, communication breakdowns, process ...
Sanjeev Kumar, Philip R. Cohen