Sciweavers

4880 search results - page 151 / 976
» Manuals as Structured Programs
Sort
View
162
Voted
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 7 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
149
Voted
ESOP
2006
Springer
15 years 7 months ago
Inference of User-Defined Type Qualifiers and Qualifier Rules
Abstract. In previous work, we described a new approach to supporting userdefined type qualifiers, which augment existing types to specify and check additional properties of intere...
Brian Chin, Shane Markstrum, Todd D. Millstein, Je...
120
Voted
ICDAR
2003
IEEE
15 years 8 months ago
A Segmentation Method for Bibliographic References by Contextual Tagging of Fields
In this paper, a method based on part-of-speech tagging (PoS) is used for bibliographic reference structure. This method operates on a roughly structured ASCII file, produced by O...
Dominique Besagni, Abdel Belaïd, Nelly Benet
156
Voted
GECCO
2005
Springer
195views Optimization» more  GECCO 2005»
15 years 9 months ago
Evolving fuzzy decision tree structure that adapts in real-time
A fuzzy logic algorithm has been developed that automatically allocates electronic attack (EA) resources distributed over different platforms in real-time. The controller must be ...
James F. Smith III
IIE
2006
82views more  IIE 2006»
15 years 3 months ago
Structure, Scoring and Purpose of Computing Competitions
We identify aspects of computing competition formats as they relate to the purpose of these competitions, both stated and tacit. We consider the major international competitions
Gordon V. Cormack, Ian Munro, Troy Vasiga, Graeme ...