Sciweavers

47 search results - page 5 / 10
» Intrinsic Universality in Self-Assembly
Sort
View
DSN
2000
IEEE
14 years 2 months ago
Benchmarking Anomaly-Based Detection Systems
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
Roy A. Maxion, Kymie M. C. Tan
CVPR
2009
IEEE
15 years 5 months ago
Rank Priors for Continuous Non-Linear Dimensionality Reduction
Non-linear dimensionality reductionmethods are powerful techniques to deal with high-dimensional datasets. However, they often are susceptible to local minima and perform poorly ...
Andreas Geiger (Karlsruhe Institute of Technology)...
SAC
2010
ACM
14 years 4 months ago
Nudge: intermediaries' role in interdependent network security
ombiners for Software Hardening - Extended Abstract (Short Paper) Amir Herzberg and Haya Shulman (Bar Ilan University) The PUF Promise (Short Paper) Heike Busch and Miroslava Sotak...
Jens Grossklags, Svetlana Radosavac, Alvaro A. C&a...
NIPS
2003
13 years 11 months ago
Ranking on Data Manifolds
The Google search engine has enjoyed huge success with its web page ranking algorithm, which exploits global, rather than local, hyperlink structure of the web using random walks....
Dengyong Zhou, Jason Weston, Arthur Gretton, Olivi...
COMGEO
2011
ACM
13 years 1 months ago
Physical world as an internet of things
ABSTRACT . Categories and Subject Descriptors K. Computing Milieux K.m MISCELLANEOUS General Terms Theory Keywords Cyber-physics, Internet of Things, Quantum computing Cloud Comput...
Simon Berkovich