Sciweavers

1804 search results - page 344 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
AIPS
2009
13 years 10 months ago
Flexible Execution of Plans with Choice
Dynamic plan execution strategies allow an autonomous agent to respond to uncertainties while improving robustness and reducing the need for an overly conservative plan. Executive...
Patrick R. Conrad, Julie A. Shah, Brian C. William...
JAL
2002
113views more  JAL 2002»
13 years 8 months ago
A multivariate view of random bucket digital search trees
We take a multivariate view of digital search trees by studying the number of nodes of different types that may coexist in a bucket digital search tree as it grows under an arbitr...
Friedrich Hubalek, Hsien-Kuei Hwang, William Lew, ...
SIGMOD
2009
ACM
476views Database» more  SIGMOD 2009»
14 years 3 months ago
MobileMiner: a real world case study of data mining in mobile communication
Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
Tengjiao Wang, Bishan Yang, Jun Gao, Dongqing Yang...
PPDP
2007
Springer
14 years 2 months ago
Unfolding in CHR
Program transformation is an appealing technique which allows to improve run-time efficiency, space-consumption and more generally to optimize a given program. Essentially it con...
Paolo Tacchella, Maurizio Gabbrielli, Maria Chiara...
MM
2003
ACM
241views Multimedia» more  MM 2003»
14 years 2 months ago
Invariance in motion analysis of videos
In this paper, we propose an approach that retrieves motion of objects from the videos based on the dynamic time warping of view invariant characteristics. The motion is represent...
Cen Rao, Mubarak Shah, Tanveer Fathima Syeda-Mahmo...