Sciweavers

2175 search results - page 423 / 435
» From Human Knowledge to Process Models
Sort
View
CCS
2003
ACM
14 years 3 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
CBMS
2001
IEEE
14 years 1 months ago
An Interoperable Data Architecture for Data Exchange in a Biomedical Research Network
Knowledge discovery and data correlation require a unified approach to basic data management. However, achieving such an approach is nearly impossible with hundreds of disparate d...
Daniel J. Crichton, J. Steven Hughes, Gregory J. D...
JMLR
2006
124views more  JMLR 2006»
13 years 9 months ago
Policy Gradient in Continuous Time
Policy search is a method for approximately solving an optimal control problem by performing a parametric optimization search in a given class of parameterized policies. In order ...
Rémi Munos
TSP
2010
13 years 4 months ago
Channel energy based estimation of target trajectories using distributed sensors with low communication rate
Abstract--Sensor localization using channel energy measurements of distributed sensors has been studied in various scenarios. However, it is usually assumed that the target does no...
Christian R. Berger, Sora Choi, Shengli Zhou, Pete...
BMCBI
2008
218views more  BMCBI 2008»
13 years 10 months ago
LOSITAN: A workbench to detect molecular adaptation based on a Fst-outlier method
Background: Testing for selection is becoming one of the most important steps in the analysis of multilocus population genetics data sets. Existing applications are difficult to u...
Tiago Antao, Ana Lopes, Ricardo J. Lopes, Albano B...