Sciweavers

1102 search results - page 66 / 221
» Bayesian Network Trust Model in Peer-to-Peer Networks
Sort
View
IJDAR
2010
169views more  IJDAR 2010»
13 years 6 months ago
A Bayesian network for combining descriptors: application to symbol recognition
Inthispaper,weproposeadescriptorcombination method, which enables to improve significantly the recognition rate compared to the recognition rates obtained by each descriptor. This ...
Sabine Barrat, Salvatore Tabbone
LOCA
2005
Springer
14 years 1 months ago
Prediction of Indoor Movements Using Bayesian Networks
Abstract. This paper investigates the efficiency of in-door next location prediction by comparing several prediction methods. The scenario concerns people in an office building vis...
Jan Petzold, Andreas Pietzowski, Faruk Bagci, Wolf...
ICEIS
2008
IEEE
14 years 2 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
BMCBI
2007
172views more  BMCBI 2007»
13 years 7 months ago
Bayesian approaches to reverse engineer cellular systems: a simulation study on nonlinear Gaussian networks
Background: Reverse engineering cellular networks is currently one of the most challenging problems in systems biology. Dynamic Bayesian networks (DBNs) seem to be particularly su...
Fulvia Ferrazzi, Paola Sebastiani, Marco Ramoni, R...
CVPR
2008
IEEE
14 years 9 months ago
Learning Bayesian Networks with qualitative constraints
Graphical models such as Bayesian Networks (BNs) are being increasingly applied to various computer vision problems. One bottleneck in using BN is that learning the BN model param...
Yan Tong, Qiang Ji