Sciweavers

2097 search results - page 170 / 420
» Knowledge Base Maintenance through Knowledge Representation
Sort
View
122
Voted
FUZZIEEE
2007
IEEE
15 years 10 months ago
Decoding Trace Peak Behaviour - A Neuro-Fuzzy Approach
— DNA sequence basecalling is commonly regarded as a solved problem, despite significant error rates being reflected in inaccuracies in databases and genome annotations. This has...
David Thornley, Stavros Petridis
ACSAC
2004
IEEE
15 years 7 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
145
Voted
DOCENG
2007
ACM
15 years 7 months ago
Thresholding of badly illuminated document images through photometric correction
This paper presents a document image thresholding technique that binarizes badly illuminated document images by the photometric correction. Based on the observation that illuminat...
Shijian Lu, Chew Lim Tan
120
Voted
EDBT
2008
ACM
158views Database» more  EDBT 2008»
16 years 3 months ago
Expressive query specification through form customization
A form-based query interface is usually the preferred means to provide an unsophisticated user access to a database. Not only is such an interface easy to use, requiring no techni...
Magesh Jayapandian, H. V. Jagadish
161
Voted
CSE
2008
IEEE
15 years 10 months ago
Adaptation to Dynamic Resource Availability in Ad Hoc Grids through a Learning Mechanism
Ad-hoc Grids are highly heterogeneous and dynamic networks, one of the main challenges of resource allocation in such environments is to find mechanisms which do not rely on the ...
Behnaz Pourebrahimi, Koen Bertels