Sciweavers

1998 search results - page 318 / 400
» Basic Association Rules
Sort
View
ICRA
2008
IEEE
123views Robotics» more  ICRA 2008»
14 years 4 months ago
Iterated filters for bearing-only SLAM
— This paper discusses the importance of iteration when performing the measurement update step for the problem of bearing-only SLAM. We focus on an undelayed approach that initia...
Stephen Tully, Hyungpil Moon, George Kantor, Howie...
ISPASS
2008
IEEE
14 years 4 months ago
Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection
This paper presents and experimentally evaluates two parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). Snort identifies intr...
Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai
ADMA
2008
Springer
114views Data Mining» more  ADMA 2008»
14 years 4 months ago
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...
ASIAMS
2007
IEEE
14 years 4 months ago
On Syntactic Composability and Model Reuse
Composability, the capability to select and assemble offthe-shelf model components in various combinations to satisfy user requirements, is an appealing approach in reducing the t...
Claudia Szabo, Yong Meng Teo
CIBCB
2007
IEEE
14 years 4 months ago
Spectral Decomposition of Signaling Networks
—Many dynamical processes can be represented as directed attributed graphs or Petri nets where relationships between various entities are explicitly expressed. Signaling networks...
Bahram Parvin, Nirmalya Ghosh, Laura Heiser, Merri...