Sciweavers

1622 search results - page 311 / 325
» Learning a Hidden Matching
Sort
View
CHI
2006
ACM
15 years 10 months ago
A goal-oriented web browser
Many users are familiar with the interesting but limited functionality of Data Detector interfaces like Microsoft's Smart Tags and Google's AutoLink. In this paper we si...
Alexander Faaborg, Henry Lieberman
NDSS
2008
IEEE
15 years 4 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
AIIA
2007
Springer
15 years 3 months ago
A Hierarchical Clustering Procedure for Semantically Annotated Resources
Abstract. A clustering method is presented which can be applied to relational knowledge bases. It can be used to discover interesting groupings of resources through their (semantic...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito
RAID
2005
Springer
15 years 3 months ago
FLIPS: Hybrid Adaptive Intrusion Prevention
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...
91
Voted
PRICAI
2004
Springer
15 years 3 months ago
Computational Methods for Identification of Human microRNA Precursors
MicroRNA (miRNA), one of non-coding RNAs (ncRNAs), regulates gene expression directly by arresting the messenger RNA (mRNA) translation, which is important for identifying putative...
Jin-Wu Nam, Wha-Jin Lee, Byoung-Tak Zhang