Sciweavers

546 search results - page 71 / 110
» Using and Detecting Links in Wikipedia
Sort
View
IFIP
2005
Springer
15 years 6 months ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray
118
Voted
SACMAT
2003
ACM
15 years 5 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
JAIR
2007
132views more  JAIR 2007»
15 years 13 days ago
Using Linguistic Cues for the Automatic Recognition of Personality in Conversation and Text
It is well known that utterances convey a great deal of information about the speaker in addition to their semantic content. One such type of information consists of cues to the s...
François Mairesse, Marilyn A. Walker, Matth...
110
Voted
ISRR
2001
Springer
121views Robotics» more  ISRR 2001»
15 years 5 months ago
Towards a Realistic Medical Simulator using Virtual Environments and Haptic Interaction
This paper presents our experience towards the conception of a virtual reality medical simulator coupled with haptic interaction aimed at training surgeons. This area of research h...
Christian Laugier, César Mendoza, Kenneth S...
BMCBI
2010
148views more  BMCBI 2010»
15 years 19 days ago
Structuring heterogeneous biological information using fuzzy clustering of k-partite graphs
Background: Extensive and automated data integration in bioinformatics facilitates the construction of large, complex biological networks. However, the challenge lies in the inter...
Mara L. Hartsperger, Florian Blöchl, Volker S...