Sciweavers

1328 search results - page 154 / 266
» Common Knowledge
Sort
View
ICPP
2008
IEEE
14 years 3 months ago
On the Design of Fast Pseudo-Random Number Generators for the Cell Broadband Engine and an Application to Risk Analysis
Numerical simulations in computational physics, biology, and finance, often require the use of high quality and efficient parallel random number generators. We design and optimi...
David A. Bader, Aparna Chandramowlishwaran, Virat ...
ISI
2007
Springer
13 years 8 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
LREC
2008
107views Education» more  LREC 2008»
13 years 10 months ago
Evaluation of Different Segmentation Techniques for Dialogue Turns
In dialogue systems, it is necessary to decode the user input into semantically meaningful units. These semantical units, usually Dialogue Acts (DA), are used by the system to pro...
Carlos D. Martínez-Hinarejos, Vicent Tamari...
IJNSEC
2006
89views more  IJNSEC 2006»
13 years 8 months ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 7 months ago
Budget Feasible Mechanisms
We study a novel class of mechanism design problems in which the outcomes are constrained by the payments. This basic class of mechanism design problems captures many common econom...
Christos H. Papadimitriou, Yaron Singer