Sciweavers

575 search results - page 18 / 115
» Towards Electrical, Integrated Implementations of SIMPL Syst...
Sort
View
IAT
2009
IEEE
15 years 3 months ago
Integrating NLP with Reasoning about Actions for Autonomous Agents Communicating with Humans
—We present a first effort to integrate NLP with ASP for autonomous agents, especially service robots, communicating with humans. We implemented a prototype system and tested it...
Xiaoping Chen, Jiehui Jiang, Jianmin Ji, Guoqiang ...
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
16 years 3 days ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
OTM
2007
Springer
15 years 5 months ago
Toward Sound-Assisted Intrusion Detection Systems
Network intrusion detection has been generally dealt with using sophisticated software and statistical analysis, although sometimes it has to be done by administrators, either by d...
Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark ...
ADBIS
2007
Springer
125views Database» more  ADBIS 2007»
15 years 5 months ago
Towards Self-Optimization of Message Transformation Processes
The Message Transformation Model (MTM), for modeling complex message transformation processes in data centric application scenarios, provides strong capabilities for describing the...
Matthias Böhm, Dirk Habich, Uwe Wloka, Jü...
ACSAC
2001
IEEE
15 years 3 months ago
A JCA-Based Implementation Framework for Threshold Cryptography
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Yih Huang, David Rine, Xunhua Wang