Sciweavers

1102 search results - page 193 / 221
» Bayesian Network Trust Model in Peer-to-Peer Networks
Sort
View
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
13 years 5 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
JMLR
2010
157views more  JMLR 2010»
13 years 2 months ago
Why are DBNs sparse?
Real stochastic processes operating in continuous time can be modeled by sets of stochastic differential equations. On the other hand, several popular model families, including hi...
Shaunak Chatterjee, Stuart Russell
ICDAR
2007
IEEE
13 years 11 months ago
On the Use of Lexeme Features for Writer Verification
Document examiners use a variety of features to analyze a given handwritten document for writer verification. The challenge in the automatic classification of a pair of documents ...
A. Bhardwaj, A. Singh, Harish Srinivasan, Sargur N...
BMCBI
2006
133views more  BMCBI 2006»
13 years 7 months ago
Choosing negative examples for the prediction of protein-protein interactions
The protein-protein interaction networks of even well-studied model organisms are sketchy at best, highlighting the continued need for computational methods to help direct experim...
Asa Ben-Hur, William Stafford Noble
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
14 years 2 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...