Sciweavers

409 search results - page 52 / 82
» Review spam detection
Sort
View
CHI
2007
ACM
16 years 6 days ago
Understanding and developing models for detecting and differentiating breakpoints during interactive tasks
The ability to detect and differentiate breakpoints during task execution is critical for enabling defer-to-breakpoint policies within interruption management. In this work, we ex...
Shamsi T. Iqbal, Brian P. Bailey
BIOSURVEILLANCE
2007
Springer
15 years 6 months ago
A Study into Detection of Bio-Events in Multiple Streams of Surveillance Data
Abstract. This paper reviews the results of a study into combining evidence from multiple streams of surveillance data in order to improve timeliness and specificity of detection ...
Josep Roure, Artur Dubrawski, Jeff Schneider
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
15 years 5 months ago
Is negative selection appropriate for anomaly detection?
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...
PERVASIVE
2005
Springer
15 years 5 months ago
Embedded Assessment: Overcoming Barriers to Early Detection with Pervasive Computing
Abstract. Embedded assessment leverages the capabilities of pervasive computing to advance early detection of health conditions. In this approach, technologies embedded in the home...
Margaret E. Morris, Stephen S. Intille, Jennifer B...
HOLOMAS
2007
Springer
15 years 6 months ago
Agent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Martin Rehák, Michal Pechoucek, David Medvi...