Sciweavers

162 search results - page 16 / 33
» Constructs for Building Complex Symbolic-Connectionist Syste...
Sort
View
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
13 years 5 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
TCBB
2010
89views more  TCBB 2010»
13 years 5 months ago
Model Composition for Macromolecular Regulatory Networks
—Models of regulatory networks become more difficult to construct and understand as they grow in size and complexity. Large models are usually built up from smaller models, repre...
Ranjit Randhawa, Clifford A. Shaffer, John J. Tyso...
FAST
2009
13 years 5 months ago
Scalable Access Controls for Lineage
Lineage stores often contain sensitive information that needs protection from unauthorized access. We build on prior work for security and privacy of lineage information, focusing...
Arnon Rosenthal, Len Seligman, Adriane Chapman, Ba...
JUCS
2008
112views more  JUCS 2008»
13 years 7 months ago
Knowledge Processing in Intelligent Systems
Abstract: Intelligence and Knowledge play more and more important roles in building complex intelligent systems, for instance, intrusion detection systems, and operational analysis...
Longbing Cao, Ngoc Thanh Nguyen
COMPLEXITY
2006
91views more  COMPLEXITY 2006»
13 years 7 months ago
The evolution of technology within a simple computer model
Technology--the collection of devices and methods available to human society--evolves by constructing new devices and methods from ones that previously exist, and in turn offering...
W. Brian Arthur, Wolfgang Polak