Sciweavers

2236 search results - page 114 / 448
» Intrusion detection techniques and approaches
Sort
View
ISBRA
2010
Springer
14 years 8 months ago
A Consensus Tree Approach for Reconstructing Human Evolutionary History and Detecting Population Substructure
The random accumulation of variations in the human genome over time implicitly encodes a history of how human populations have arisen, dispersed, and intermixed since we emerged as...
Ming-Chi Tsai, Guy E. Blelloch, R. Ravi, Russell S...
IR
2000
14 years 10 months ago
New Approaches to Spoken Document Retrieval
This paper presents four novel techniques for open-vocabulary spoken document retrieval: a method to detect slots that possibly contain a query feature; a method to estimate occurr...
Martin Wechsler, Eugen Munteanu, Peter Schäub...
ICWE
2007
Springer
15 years 4 months ago
Transparent Interface Composition in Web Applications
Abstract. In this paper we present an approach for oblivious composition of Web user interfaces, particularly for volatile functionality. Our approach, which is inspired on well-kn...
Jeronimo Ginzburg, Gustavo Rossi, Matias Urbieta, ...
HICSS
2003
IEEE
121views Biometrics» more  HICSS 2003»
15 years 3 months ago
Repeatable Quality Assurance Techniques for Requirements Negotiations
Many software projects fail because early life-cycle defects such as ill-defined requirements are not identified and removed. Therefore, quality assurance (QA) techniques for defe...
Paul Grünbacher, Michael Halling, Stefan Biff...
NAACL
1994
14 years 11 months ago
Integrated Techniques for Phrase Extraction from Speech
We present an integrated approach to speech and natural language processing which uses a single parser to create training for a statistical speech recognition component and for in...
Marie Meteer, Jan Robin Rohlicek