Sciweavers

6253 search results - page 1093 / 1251
» Use Case Modeling Guidelines
Sort
View
119
Voted
ESAW
2004
Springer
15 years 9 months ago
Motivation-Based Selection of Negotiation Opponents
Abstract. If we are to enable agents to handle increasingly greater levels of complexity, it is necessary to equip them with mechanisms that support greater degrees of autonomy. Th...
Stephen J. Munroe, Michael Luck
140
Voted
RAID
2004
Springer
15 years 9 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
131
Voted
SETN
2004
Springer
15 years 9 months ago
Text Normalization for the Pronunciation of Non-standard Words in an Inflected Language
In this paper we present a novel approach, called “Text to Pronunciation (TtP)”, for the proper normalization of Non-Standard Words (NSWs) in unrestricted texts. The methodolog...
Gerasimos Xydas, Georgios Karberis, Georgios Kouro...
138
Voted
VECPAR
2004
Springer
15 years 9 months ago
PerWiz: A What-If Prediction Tool for Tuning Message Passing Programs
Abstract. This paper presents PerWiz, a performance prediction tool for improving the performance of message passing programs. PerWiz focuses on locating where a significant impro...
Fumihiko Ino, Yuki Kanbe, Masao Okita, Kenichi Hag...
122
Voted
DATE
2003
IEEE
114views Hardware» more  DATE 2003»
15 years 9 months ago
Ambient Intelligence Visions and Achievements: Linking Abstract Ideas to Real-World Concepts
Intelligence Visions and Achievements: Linking Abstract Ideas to Real-World Concepts Menno Lindwer  ¢¡ , Diana Marculescu £¥¤ , Twan Basten ¦§¡ , Rainer Zimmermann ¨ , Ra...
Menno Lindwer, Diana Marculescu, Twan Basten, Rain...
« Prev « First page 1093 / 1251 Last » Next »