Sciweavers

7853 search results - page 1425 / 1571
» Learning from Each Other
Sort
View
KDD
2009
ACM
193views Data Mining» more  KDD 2009»
14 years 4 months ago
Category detection using hierarchical mean shift
Many applications in surveillance, monitoring, scientific discovery, and data cleaning require the identification of anomalies. Although many methods have been developed to iden...
Pavan Vatturi, Weng-Keen Wong
ATAL
2009
Springer
14 years 4 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
FOCS
2007
IEEE
14 years 4 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
MIDDLEWARE
2007
Springer
14 years 4 months ago
Augmenting reflective middleware with an aspect orientation support layer
Reflective middleware provides an effective way to support adaptation in distributed systems. However, as distributed systems become increasingly complex, certain drawbacks of the...
Bholanathsingh Surajbali, Geoff Coulson, Phil Gree...
IJCNN
2006
IEEE
14 years 4 months ago
Non-Relevance Feedback Document Retrieval based on One Class SVM and SVDD
— This paper reports a new document retrieval method using non-relevant documents. Especially, this paper reports a comparison of retrieval efficiency between One Class Support ...
Takashi Onoda, Hiroshi Murata, Seiji Yamada
« Prev « First page 1425 / 1571 Last » Next »