Sciweavers

1855 search results - page 339 / 371
» Composing model programs for analysis
Sort
View
ICALP
2009
Springer
14 years 8 months ago
Learning Halfspaces with Malicious Noise
We give new algorithms for learning halfspaces in the challenging malicious noise model, where an adversary may corrupt both the labels and the underlying distribution of examples....
Adam R. Klivans, Philip M. Long, Rocco A. Servedio
WWW
2004
ACM
14 years 9 months ago
Semantic email
This paper investigates how the vision of the Semantic Web can be carried over to the realm of email. We introduce a general notion of semantic email, in which an email message co...
Luke McDowell, Oren Etzioni, Alon Y. Halevy, Henry...
GLOBECOM
2007
IEEE
14 years 2 months ago
Minimum Coverage Breach and Maximum Network Lifetime in Wireless Sensor Networks
—Network lifetime is a critical issue in Wireless Sensor Networks. It is possible to extend network lifetime by organizing the sensors into a number of sensor covers. However, wi...
Chen Wang, My T. Thai, Yingshu Li, Feng Wang 0002,...
KBSE
2005
IEEE
14 years 2 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
WSC
2000
13 years 9 months ago
3D visualization of simulated construction operations
Significant advances have been made in the field of construction process modeling. However, no convenient graphical support tools exist that can depict the modeled operations in 3...
Vineet R. Kamat, Julio C. Martínez