Sciweavers

611 search results - page 85 / 123
» Knowledge Acquisition Evaluation Using Simulated Experts
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 12 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
BIRTHDAY
2006
Springer
13 years 11 months ago
Verification by Parallelization of Parametric Code
Abstract. Loops and other unbound control structures constitute a major bottleneck in formal software verification, because correctness proofs over such control structures generall...
Tobias Gedell, Reiner Hähnle
SDM
2007
SIAM
169views Data Mining» more  SDM 2007»
13 years 9 months ago
Rank Aggregation for Similar Items
The problem of combining the ranked preferences of many experts is an old and surprisingly deep problem that has gained renewed importance in many machine learning, data mining, a...
D. Sculley
IAJIT
2007
90views more  IAJIT 2007»
13 years 7 months ago
Software Reuse for Mobile Robot Applications Through Analysis Patterns
: Software analysis pattern is an approach of software reuse which provides a way to reuse expertise that can be used across domains at early level of development. Developing softw...
Dayang N. A. Jawawi, Safaai Deris, Rosbi Mamat
ATAL
2007
Springer
14 years 1 months ago
Policy recognition for multi-player tactical scenarios
This paper addresses the problem of recognizing policies given logs of battle scenarios from multi-player games. The ability to identify individual and team policies from observat...
Gita Sukthankar, Katia P. Sycara