Sciweavers

813 search results - page 98 / 163
» A comparison of evaluation methods in coevolution
Sort
View
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
14 years 1 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
EATIS
2007
ACM
14 years 24 days ago
Techniques for location selection on a mobile device
In the current paper we present a field comparison of techniques for selecting one's current location in mobile locationbased systems. Four location selection techniques are ...
Mika Luimula, Kirsti Sääskilahti, Timo P...
ECML
2006
Springer
14 years 16 days ago
EM Algorithm for Symmetric Causal Independence Models
Causal independence modelling is a well-known method both for reducing the size of probability tables and for explaining the underlying mechanisms in Bayesian networks. In this pap...
Rasa Jurgelenaite, Tom Heskes
AMAST
2008
Springer
13 years 11 months ago
An Algebra for Features and Feature Composition
Feature-Oriented Software Development (FOSD) provides a multitude of formalisms, methods, languages, and tools for building variable, customizable, and extensible software. Along d...
Sven Apel, Christian Lengauer, Bernhard Mölle...
DSN
2008
IEEE
13 years 10 months ago
Experiences with formal specification of fault-tolerant file systems
Fault-tolerant, replicated file systems are a crucial component of today's data centers. Despite their huge complexity, these systems are typically specified only in brief pr...
Roxana Geambasu, Andrew Birrell, John MacCormick