Abstract. We were inspired by the role of co-stimulation in the Biological immune system (BIS). We propose and evaluate an algorithm for energy efficient misbehavior detection in a...
Martin Drozda, Sven Schaust, Sebastian Schildt, He...
In this paper, we present a replanning algorithm for a decision-theoretic hierarchical planner, illustrate the experimental methodology we designed to investigate its performance,...
Utilizing graphics hardware for general purpose numerical computations has become a topic of considerable interest. The implementation of streaming algorithms, typified by highly ...
In this study, we formalize a multi-focal learning problem, where training data are partitioned into several different focal groups and the prediction model will be learned within...
Yong Ge, Hui Xiong, Wenjun Zhou, Ramendra K. Sahoo...
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...