Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
We describe an application of machine learning to the problem of geomorphic mapping of planetary surfaces. Mapping landforms on planetary surfaces is an important task and the fi...
Tomasz F. Stepinski, Soumya Ghosh, Ricardo Vilalta
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
This paper describes a new qualitative-quantitative simulator to help buyers learn how to make decisions when they purchase goods. In this paper, we propose an elearning support s...
Spoken language generation for dialogue systems requires a dictionary of mappings between semantic representations of concepts the system wants to express and realizations of thos...
Ryuichiro Higashinaka, Rashmi Prasad, Marilyn A. W...