Sciweavers

645 search results - page 78 / 129
» Pure patterns type systems
Sort
View
WEBI
2009
Springer
15 years 6 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
CIARP
2003
Springer
15 years 3 months ago
Uniclass and Multiclass Connectionist Classification of Dialogue Acts
Classification problems are traditionally focused on uniclass samples, that is, each sample of the training and test sets has one unique label, which is the target of the classific...
María José Castro Bleda, David Vilar...
ACMACE
2005
ACM
15 years 1 months ago
AI middleware as means for improving gameplay
Current commercial AI middleware are still far from being a generic and flexible tool for developing computer games. Also the literature lacks proposals in this field. In this w...
Börje Karlsson, Bruno Feijó
USS
2010
14 years 9 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...
ICANN
2009
Springer
14 years 9 months ago
Mental Tasks Classification for a Noninvasive BCI Application
Mapping brain activity patterns in external actions has been studied in recent decades and is the base of a brain-computer interface. This type of interface is extremely useful for...
Alexandre Ormiga G. Barbosa, David Ronald A. Diaz,...