Sciweavers

2317 search results - page 326 / 464
» DMVIS: Design, Modelling and Validation of Interactive Syste...
Sort
View
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
11 years 10 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
NSDI
2004
13 years 9 months ago
Designing a DHT for Low Latency and High Throughput
Designing a wide-area distributed hash table (DHT) that provides high-throughput and low-latency network storage is a challenge. Existing systems have explored a range of solution...
Frank Dabek, Jinyang Li, Emil Sit, James Robertson...
ICAI
2004
13 years 9 months ago
Evaluation of an Agent-Mediated Social Network
The goal of this work is to design and implement an agent-based system that facilitates interaction among a group of individuals who are part of an organization, observe types and...
Taneem Ibrahim, Aaron Arthurs, Henry Hexmoor
ATAL
2007
Springer
14 years 7 days ago
Confidence-based policy learning from demonstration using Gaussian mixture models
We contribute an approach for interactive policy learning through expert demonstration that allows an agent to actively request and effectively represent demonstration examples. I...
Sonia Chernova, Manuela M. Veloso
ASPDAC
2004
ACM
94views Hardware» more  ASPDAC 2004»
14 years 5 hour ago
Improving simulation-based verification by means of formal methods
The design of complex systems is largely ruled by the time needed for verification. Even though formal methods can provide higher reliability, in practice often simulation based ve...
Görschwin Fey, Rolf Drechsler