Sciweavers

1088 search results - page 174 / 218
» Knowledge map of information science
Sort
View
CCS
2009
ACM
15 years 6 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...
ICON
2007
IEEE
15 years 6 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...
MICAI
2007
Springer
15 years 6 months ago
Enrichment of Automatically Generated Texts Using Metaphor
Computer-generated texts are yet far from human-generated ones. Along with the limited use of vocabulary and syntactic structures sent, their lack of creativeness and abstraction i...
Raquel Hervás, Rui P. Costa, Hugo Costa, Pa...
DATE
2006
IEEE
110views Hardware» more  DATE 2006»
15 years 6 months ago
Layout driven data communication optimization for high level synthesis
High level synthesis transformations play a major part in shaping the properties of the final circuit. However, most optimizations are performed without much knowledge of the fina...
Ryan Kastner, Wenrui Gong, Xin Hao, Forrest Brewer...
IDEAS
2005
IEEE
93views Database» more  IDEAS 2005»
15 years 5 months ago
Semantic Query Transformation Using Ontologies
Traditional approaches to query processing aim at rewriting a given query into another more efficient one that uses less time and/or resources during the execution. There by, the...
Chokri Ben Necib, Johann Christoph Freytag