Sciweavers

2236 search results - page 409 / 448
» Intrusion detection techniques and approaches
Sort
View
CAISE
2008
Springer
13 years 9 months ago
A New Paradigm for the Enactment and Dynamic Adaptation of Data-Driven Process Structures
Abstract. Industry is increasingly demanding IT support for large engineering processes, i.e., process structures consisting of hundreds up to thousands of processes. Developing a ...
Dominic Müller, Manfred Reichert, Joachim Her...
CEAS
2008
Springer
13 years 9 months ago
Personalized Spam Filtering for Gray Mail
Gray mail, messages that could reasonably be considered either spam or good by different email users, is a commonly observed issue in production spam filtering systems. In this pa...
Ming-Wei Chang, Scott Yih, Robert McCann
DAS
2008
Springer
13 years 9 months ago
A Two-Step Dewarping of Camera Document Images
Dewarping of camera document images has attracted a lot of interest over the last few years since warping not only reduces the document readability but also affects the accuracy o...
Nikolaos Stamatopoulos, Basilios Gatos, Ioannis Pr...
AAAI
2010
13 years 9 months ago
Understanding the Success of Perfect Information Monte Carlo Sampling in Game Tree Search
Perfect Information Monte Carlo (PIMC) search is a practical technique for playing imperfect information games that are too large to be optimally solved. Although PIMC search has ...
Jeffrey Richard Long, Nathan R. Sturtevant, Michae...
NIPS
2001
13 years 9 months ago
Unsupervised Learning of Human Motion Models
This paper presents an unsupervised learning algorithm that can derive the probabilistic dependence structure of parts of an object (a moving human body in our examples) automatic...
Yang Song, Luis Goncalves, Pietro Perona