Sciweavers

2958 search results - page 408 / 592
» Using Anonymized Data for Classification
Sort
View
AINA
2007
IEEE
15 years 11 months ago
Detecting Coordinated Distributed Multiple Attacks
This paper describes results concerning the robustness and generalization capabilities of kernel methods in detecting coordinated distributed multiple attacks (CDMA) using network...
Srinivas Mukkamala, Krishna Yendrapalli, Ram B. Ba...
IJCNN
2007
IEEE
15 years 11 months ago
Neurolinguistic Approach to Vector Representation of Medical Concepts
Abstract—Putative brain processes responsible for understanding language are based on spreading activation in semantic networks, providing enhanced representations that involve c...
Wlodzislaw Duch, Pawel Matykiewicz, John Pestian
CHI
2004
ACM
15 years 10 months ago
Text analysis as a tool for analyzing conversation in online support groups
In this paper we describe a software tool that allows investigators to make comparisons across different online forums and media by analyzing word counts in userspecified categori...
Adam D. I. Kramer, Susan R. Fussell, Leslie D. Set...
IEAAIE
2004
Springer
15 years 10 months ago
Recognition of Emotional States in Spoken Dialogue with a Robot
For flexible interactions between a robot and humans, we address the issue of automatic recognition of human emotions during the interaction such as embarrassment, pleasure, and af...
Kazunori Komatani, Ryosuke Ito, Tatsuya Kawahara, ...
143
Voted
CHES
2006
Springer
87views Cryptology» more  CHES 2006»
15 years 8 months ago
Templates vs. Stochastic Methods
Template Attacks and the Stochastic Model provide advanced methods for side channel cryptanalysis that make use of `a-priori' knowledge gained from a profiling step. For a sys...
Benedikt Gierlichs, Kerstin Lemke-Rust, Christof P...