Sciweavers

892 search results - page 20 / 179
» Action respecting embedding
Sort
View
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
14 years 7 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
AAIM
2009
Springer
101views Algorithms» more  AAIM 2009»
14 years 2 months ago
Orca Reduction and ContrAction Graph Clustering
During the last years, a wide range of huge networks has been made available to researchers. The discovery of natural groups, a task called graph clustering, in such datasets is a ...
Daniel Delling, Robert Görke, Christian Schul...
ATAL
2007
Springer
14 years 1 months ago
Socially embedded multi agent based simulation of financial market
This paper proposed a new approach that integrated an artificial market simulation and text-mining with real information. In this approach, economic trends were extracted from te...
Kiyoshi Izumi, Hiroki Matsui, Yutaka Matsuo
GPC
2009
Springer
13 years 11 months ago
Web Services for Deeply Embedded Extra Low-Cost Devices
Abstract. This paper describes a new approach to implement Web Services in embedded devices connected to Wireless Sensor Networks. The sensor/actuator node is able to process stand...
David Villa, Felix Jesús Villanueva, Franci...
FGR
2004
IEEE
216views Biometrics» more  FGR 2004»
13 years 11 months ago
Multimodal Coordination of Facial Action, Head Rotation, and Eye Motion during Spontaneous Smiles
Both the configuration of facial features and the timing of facial actions are important to emotion and communication. Previous literature has focused on the former. We developed ...
Jeffrey F. Cohn, Lawrence Ian Reed, Tsuyoshi Moriy...