Sciweavers

2047 search results - page 402 / 410
» Pervasive Computing on Active Networks
Sort
View
ACSAC
2008
IEEE
15 years 6 days ago
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
Vanessa Frías-Martínez, Salvatore J....
103
Voted
CAD
2008
Springer
14 years 10 months ago
Tracking product specification dependencies in collaborative design for conflict management
The main difficulty associated with a collaborative design process is understanding the product data exchanged during design. Efficient and effective coordination of design activi...
Mohamed-Zied Ouertani, Lilia Gzara Yesilbas
AC
2005
Springer
14 years 10 months ago
The state of artificial intelligence
Artificial intelligence has been an active branch of research for computer scientists and psychologists for 50 years. The concept of mimicking human intelligence in a computer fue...
Adrian A. Hopgood
COLING
2002
14 years 10 months ago
Data-driven Classification of Linguistic Styles in Spoken Dialogues
Language users have individual linguistic styles. A spoken dialogue system may benefit from adapting to the linguistic style of a user in input analysis and output generation. To ...
Thomas Portele
140
Voted
ISW
2010
Springer
14 years 8 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang