Sciweavers

8201 search results - page 1485 / 1641
» Approaching Manual Intelligence
Sort
View
CCS
2009
ACM
15 years 11 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...
CP
2009
Springer
15 years 11 months ago
Why Cumulative Decomposition Is Not as Bad as It Sounds
Abstract. The global cumulative constraint was proposed for modelling cumulative resources in scheduling problems for finite domain (FD) propagation. Since that time a great deal ...
Andreas Schutt, Thibaut Feydy, Peter J. Stuckey, M...
ICALT
2009
IEEE
15 years 11 months ago
Learning Activity Spaces: Towards Flexibility in Learning Design?
Designing a computer-supported learning scenario involving a constructivist approach of learning lays on a paradox. On the one hand, learning flows must be precisely described –...
Anne Lejeune, Muriel Ney, Armin Weinberger, Margus...
ICASSP
2009
IEEE
15 years 11 months ago
On the use of Bayesian modeling for predicting noise reduction performance
In speech enhancement applications, a validated metric of noise reduction performance is vital in the relative ranking of noise reduction algorithms and in enhancing the performan...
Nazanin Pourmand, David Suelzle, Vijay Parsa, Yi H...
ICC
2009
IEEE
107views Communications» more  ICC 2009»
15 years 11 months ago
Dynamic Resource Modeling for Heterogeneous Wireless Networks
— High variability of access resources in heterogenous wireless networks and limited computing power and battery life of mobile computing devices such as smartphones call for nov...
Dimitrios Tsamis, Tansu Alpcan, Jatinder Pal Singh...
« Prev « First page 1485 / 1641 Last » Next »