Sciweavers

397 search results - page 38 / 80
» An empirical study of optimizations in YOGI
Sort
View
JCS
2002
103views more  JCS 2002»
13 years 7 months ago
Toward Cost-Sensitive Modeling for Intrusion Detection and Response
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion...
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. S...
IEEESP
2010
99views more  IEEESP 2010»
13 years 6 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
EMNLP
2009
13 years 5 months ago
Web-Scale Distributional Similarity and Entity Set Expansion
Computing the pairwise semantic similarity between all words on the Web is a computationally challenging task. Parallelization and optimizations are necessary. We propose a highly...
Patrick Pantel, Eric Crestan, Arkady Borkovsky, An...
AISS
2010
130views more  AISS 2010»
13 years 5 months ago
Neural Network Modeling for Proton Exchange Membrane Fuel Cell (PEMFC)
This paper presents the artificial intelligence techniques to control a proton exchange membrane fuel cell system process using particularly a methodology of dynamic neural networ...
Youssef M. ElSayed, Moataz H. Khalil, Khairia E. A...
JMLR
2010
134views more  JMLR 2010»
13 years 2 months ago
Half Transductive Ranking
We study the standard retrieval task of ranking a fixed set of items given a previously unseen query and pose it as the half transductive ranking problem. The task is transductive...
Bing Bai, Jason Weston, David Grangier, Ronan Coll...