Sciweavers

2236 search results - page 347 / 448
» Intrusion detection techniques and approaches
Sort
View
EUROSSC
2009
Springer
15 years 1 months ago
Using Dempster-Shafer Theory of Evidence for Situation Inference
Abstract. In the domain of ubiquitous computing, the ability to identify the occurrence of situations is a core function of being ’contextaware’. Given the uncertain nature of ...
Susan McKeever, Juan Ye, Lorcan Coyle, Simon A. Do...
103
Voted
DAGM
2008
Springer
14 years 12 months ago
Approximate Parameter Learning in Conditional Random Fields: An Empirical Investigation
We investigate maximum likelihood parameter learning in Conditional Random Fields (CRF) and present an empirical study of pseudo-likelihood (PL) based approximations of the paramet...
Filip Korc, Wolfgang Förstner
CGVR
2007
14 years 11 months ago
Evaluation of Stereoscopy and Lit Shading for a Counting Task in Knot Visualization
We present an experiment on depth cues for knot visualization in desktop virtual reality (fishtank VR). We used a within-subjects experiment to investigate stereoscopic visuals an...
Nicholas G. Lipari, Christoph W. Borst
ACL
2006
14 years 11 months ago
FAST - An Automatic Generation System for Grammar Tests
This paper introduces a method for the semi-automatic generation of grammar test items by applying Natural Language Processing (NLP) techniques. Based on manually-designed pattern...
Chia-Yin Chen, Hsien-Chin Liou, Jason S. Chang
SOSP
1997
ACM
14 years 11 months ago
Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs
Multi-threaded programming is difficult and error prone. It is easy to make a mistake in synchronization that produces a data race, yet it can be extremely hard to locate this mi...
Stefan Savage, Michael Burrows, Greg Nelson, Patri...