Sciweavers

1129 search results - page 93 / 226
» Finding Similar Failures Using Callstack Similarity
Sort
View
ICDM
2003
IEEE
184views Data Mining» more  ICDM 2003»
14 years 1 months ago
Detecting Patterns of Change Using Enhanced Parallel Coordinates Visualization
Analyzing data to find trends, correlations, and stable patterns is an important problem for many industrial applications. In this paper, we propose a new technique based on paral...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Andreas Sc...
AI
2000
Springer
14 years 15 days ago
Using Object Influence Areas to Quantitatively Deal with Neighborhood and Perception in Route Descriptions
Abstract. In the GRAAD project we are developing a knowledgebased system able of determine routes in a simulated urban environment and to generate natural language descriptions whi...
Bernard Moulin, Driss Kettani, Benjamin Gauthier, ...
CSFW
2004
IEEE
13 years 12 months ago
Using Active Learning in Intrusion Detection
Intrusion Detection Systems (IDSs) have become an important part of operational computer security. They are the last line of defense against malicious hackers and help detect ongo...
Magnus Almgren, Erland Jonsson
CIE
2006
Springer
13 years 12 months ago
Lower Bounds Using Kolmogorov Complexity
Abstract. In this paper, we survey a few recent applications of Kolmogorov complexity to lower bounds in several models of computation. We consider KI complexity of Boolean functio...
Sophie Laplante
BIOCOMP
2006
13 years 9 months ago
An Approach to Selecting Putative RNA Motifs Using MDL Principle
The history of molecular biology is punctuated by a series of discoveries demonstrating the surprising breadth of biological roles of ribonucleic acid (RNA). An ensemble of evoluti...
Mohammad Anwar, Marcel Turcotte