Sciweavers

5544 search results - page 885 / 1109
» Three Inadequate Models
Sort
View
122
Voted
ATAL
2008
Springer
15 years 5 months ago
Individual differences in expressive response: a challenge for ECA design
To create realistic and expressive virtual humans, we need to develop better models of the processes and dynamics of human emotions and expressions. A first step in this effort is...
Ning Wang, Stacy Marsella, Tim Hawkins
143
Voted
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 5 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
132
Voted
CBSE
2008
Springer
15 years 5 months ago
Structural Testing of Component-Based Systems
Component based development of software systems needs to devise effective test management strategies in order fully achieve its perceived advantages of cost efficiency, flexibility...
Daniel Sundmark, Jan Carlson, Sasikumar Punnekkat,...
155
Voted
CC
2008
Springer
15 years 5 months ago
Generating SIMD Vectorized Permutations
Abstract. This paper introduces a method to generate efficient vectorized implementations of small stride permutations using only vector load and vector shuffle instructions. These...
Franz Franchetti, Markus Püschel
157
Voted
CIKM
2008
Springer
15 years 5 months ago
Metric-based ontology learning
Ontology learning is an important task in Artificial Intelligence, Semantic Web and Text Mining. This paper presents a novel framework for, and solutions to, three practical probl...
Hui Yang, Jamie Callan