Sciweavers

1726 search results - page 290 / 346
» A resistance-based approach to consensus algorithm performan...
Sort
View
NSPW
2004
ACM
15 years 9 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
137
Voted
ICMI
2004
Springer
151views Biometrics» more  ICMI 2004»
15 years 9 months ago
Multimodal model integration for sentence unit detection
In this paper, we adopt a direct modeling approach to utilize conversational gesture cues in detecting sentence boundaries, called SUs, in video taped conversations. We treat the ...
Mary P. Harper, Elizabeth Shriberg
134
Voted
IMC
2003
ACM
15 years 9 months ago
Virtual landmarks for the internet
Internet coordinate schemes have been proposed as a method for estimating minimum round trip time between hosts without direct measurement. In such a scheme, each host is assigned...
Liying Tang, Mark Crovella
GECCO
2003
Springer
15 years 9 months ago
Hierarchical BOA Solves Ising Spin Glasses and MAXSAT
Abstract. Theoretical and empirical evidence exists that the hierarchical Bayesian optimization algorithm (hBOA) can solve challenging hierarchical problems and anything easier. Th...
Martin Pelikan, David E. Goldberg
MLDM
2009
Springer
15 years 8 months ago
Assisting Data Mining through Automated Planning
The induction of knowledge from a data set relies in the execution of multiple data mining actions: to apply filters to clean and select the data, to train different algorithms (...
Fernando Fernández, Daniel Borrajo, Susana ...