Sciweavers

1146 search results - page 38 / 230
» Finite cupping sets
Sort
View
ACSC
2005
IEEE
14 years 1 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie
ROBOCUP
2005
Springer
99views Robotics» more  ROBOCUP 2005»
14 years 1 months ago
Keepaway Soccer: From Machine Learning Testbed to Benchmark
Keepaway soccer has been previously put forth as a testbed for machine learning. Although multiple researchers have used it successfully for machine learning experiments, doing so ...
Peter Stone, Gregory Kuhlmann, Matthew E. Taylor, ...
ROBOCUP
2004
Springer
113views Robotics» more  ROBOCUP 2004»
14 years 1 months ago
The Use of Gyroscope Feedback in the Control of the Walking Gaits for a Small Humanoid Robot
This paper describes methods used in stabilizing the walking gait of TAO-PIE-PIE, a small humanoid robot given rate feedback from two RC gyroscopes. TAO-PIE-PIE is a fully autonomo...
Jacky Baltes, Sara McGrath, John Anderson
AOSE
2003
Springer
14 years 28 days ago
Building Blocks for Agent Design
We present our Component-Based Agent Framework, which enables a software engineer to design a set of agents by using a visual compo nent-based toolkit (Sun’s BDK), and wiring tog...
Hrishikesh J. Goradia, José M. Vidal
ILP
2003
Springer
14 years 27 days ago
A Multi-relational Decision Tree Learning Algorithm - Implementation and Experiments
We describe an efficient implementation (MRDTL-2) of the Multi-relational decision tree learning (MRDTL) algorithm [23] which in turn was based on a proposal by Knobbe et al. [19] ...
Anna Atramentov, Hector Leiva, Vasant Honavar