Sciweavers

4591 search results - page 865 / 919
» Learning from Dyadic Data
Sort
View
IMC
2010
ACM
13 years 6 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
MCS
2010
Springer
13 years 6 months ago
Improving Multilabel Classification Performance by Using Ensemble of Multi-label Classifiers
Multilabel classification is a challenging research problem in which each instance is assigned to a subset of labels. Recently, a considerable amount of research has been concerned...
Muhammad Atif Tahir, Josef Kittler, Krystian Mikol...
PIMRC
2010
IEEE
13 years 6 months ago
The role of channel states in secret key generation
In this work, we investigate secret key generation from channel states. We point out, by means of a packet-delaybased attack, that observing its own channel states is not the only ...
Xiang He, Aylin Yener
SEMWEB
2010
Springer
13 years 6 months ago
Semantic Techniques for Enabling Knowledge Reuse in Conceptual Modelling
Abstract. Conceptual modelling tools allow users to construct formal representations of their conceptualisations. These models are typically developed in isolation, unrelated to ot...
Jorge Gracia del Río, Jochem Liem, Esther L...
ACL
2009
13 years 6 months ago
Revisiting Pivot Language Approach for Machine Translation
This paper revisits the pivot language approach for machine translation. First, we investigate three different methods for pivot translation. Then we employ a hybrid method combin...
Hua Wu, Haifeng Wang