Sciweavers

246 search results - page 25 / 50
» A comprehensive method for comparing mental models of dynami...
Sort
View
ICASSP
2011
IEEE
12 years 10 months ago
Smart grid monitoring for intrusion and fault detection with new locally optimum testing procedures
The vulnerability of smart grid systems is a growing concern. Signal detection theory is employed here to detect a change in the system. We employ a discrete-time linear state spa...
Qian He, Rick S. Blum
DATAMINE
1999
81views more  DATAMINE 1999»
13 years 6 months ago
The Role of Occam's Razor in Knowledge Discovery
Many KDD systems incorporate an implicit or explicit preference for simpler models, but this use of "Occam's razor" has been strongly criticized by several authors (...
Pedro Domingos
RAID
2004
Springer
14 years 3 days ago
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix
Anomaly detection is a promising approach to detecting intruders masquerading as valid users (called masqueraders). It creates a user profile and labels any behavior that deviates...
Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhik...
BMCBI
2010
172views more  BMCBI 2010»
13 years 6 months ago
Comparison of evolutionary algorithms in gene regulatory network model inference
Background: The evolution of high throughput technologies that measure gene expression levels has created a data base for inferring GRNs (a process also known as reverse engineeri...
Alina Sîrbu, Heather J. Ruskin, Martin Crane
CIARP
2003
Springer
14 years 35 min ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...