Sciweavers

786 search results - page 126 / 158
» Adequacy of Limited Testing for Knowledge Based Systems
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
PICS
2000
13 years 9 months ago
CCD Requirements for Digital Photography
Digital photography has the potential to supersede conventional film photography. In order to realize this potential, digital photography needs to provide the best image quality a...
Richard L. Baer
ICASSP
2008
IEEE
14 years 2 months ago
Discriminative training by iterative linear programming optimization
In this paper, we cast discriminative training problems into standard linear programming (LP) optimization. Besides being convex and having globally optimal solution(s), LP progra...
Brian Mak, Benny Ng
ICRA
2008
IEEE
173views Robotics» more  ICRA 2008»
14 years 2 months ago
Bayesian reinforcement learning in continuous POMDPs with application to robot navigation
— We consider the problem of optimal control in continuous and partially observable environments when the parameters of the model are not known exactly. Partially Observable Mark...
Stéphane Ross, Brahim Chaib-draa, Joelle Pi...
MLMI
2005
Springer
14 years 1 months ago
Improving the Performance of Acoustic Event Classification by Selecting and Combining Information Sources Using the Fuzzy Integr
Acoustic events produced in meeting-room-like environments may carry information useful for perceptually aware interfaces. In this paper, we focus on the problem of combining diffe...
Andrey Temko, Dusan Macho, Climent Nadeu