Sciweavers

330 search results - page 57 / 66
» A statistical method for system evaluation using incomplete ...
Sort
View
IMC
2009
ACM
14 years 2 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
PVLDB
2008
122views more  PVLDB 2008»
13 years 7 months ago
Exploiting shared correlations in probabilistic databases
There has been a recent surge in work in probabilistic databases, propelled in large part by the huge increase in noisy data sources -from sensor data, experimental data, data fro...
Prithviraj Sen, Amol Deshpande, Lise Getoor
IPMI
2003
Springer
14 years 21 days ago
Ideal-Observer Performance under Signal and Background Uncertainty
We use the performance of the Bayesian ideal observer as a figure of merit for hardware optimization because this observer makes optimal use of signal-detection information. Due t...
Subok Park, Matthew A. Kupinski, Eric Clarkson, Ha...
DSN
2008
IEEE
14 years 2 months ago
Hot-spot prediction and alleviation in distributed stream processing applications
Many emerging distributed applications require the realtime processing of large amounts of data that are being updated continuously. Distributed stream processing systems offer a ...
Thomas Repantis, Vana Kalogeraki
IADIS
2003
13 years 9 months ago
Knowledge Acquisition Strategies and Navigation in Hypermedia Learning Environments: THe Influence of Instructional Design Prope
In order to understand and enhance the value of new media in education it is necessary to develop criteria for the evaluation of the effectiveness of learning with hypermedia envi...
Mattias Steinke, Thomas Huk, Christian Floto