Sciweavers

1436 search results - page 205 / 288
» Using Machine Learning Techniques to Interpret WH-questions
Sort
View
CCS
2008
ACM
15 years 3 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
104
Voted
ATAL
2009
Springer
15 years 8 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
CSDA
2008
147views more  CSDA 2008»
15 years 1 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
ITNG
2006
IEEE
15 years 7 months ago
Biomedical Term Disambiguation: An Application to Gene-Protein Name Disambiguation
The huge volumes of biomedical texts available online drives the increasing need for automated techniques to analyze and extract knowledge from these repositories of information. ...
Hisham Al-Mubaid, Ping Chen
CCS
2005
ACM
15 years 7 months ago
Keyboard acoustic emanations revisited
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and t...
Li Zhuang, Feng Zhou, J. D. Tygar