Sciweavers

1029 search results - page 42 / 206
» Learning to Make Rent-to-Buy Decisions with Systems Applicat...
Sort
View
SOUPS
2009
ACM
14 years 3 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner
ESANN
2004
13 years 10 months ago
Data Mining Techniques on the Evaluation of Wireless Churn
This work focuses on one of the most critical issues to plague the wireless telecommunications industry today: the loss of a valuable subscriber to a competitor, also defined as ch...
Jorge Ferreira, Marley B. R. Vellasco, Marco Aur&e...
ASIAMS
2008
IEEE
14 years 3 months ago
HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment
Our previous research illustrated the design of fuzzy logic based online risk assessment for Distributed Intrusion Prediction and Prevention Systems (DIPPS) [3]. Based on the DIPP...
Kjetil Haslum, Ajith Abraham, Svein J. Knapskog
TC
2008
13 years 8 months ago
An Energy-Delay Tunable Task Allocation Strategy for Collaborative Applications in Networked Embedded Systems
Collaborative applications with energy and low-delay constraints are emerging in various networked embedded systems like wireless sensor networks and multimedia terminals. Conventi...
Tao Xie 0004, Xiao Qin
METMBS
2003
255views Mathematics» more  METMBS 2003»
13 years 10 months ago
Causal Explorer: A Causal Probabilistic Network Learning Toolkit for Biomedical Discovery
Causal Probabilistic Networks (CPNs), (a.k.a. Bayesian Networks, or Belief Networks) are well-established representations in biomedical applications such as decision support system...
Constantin F. Aliferis, Ioannis Tsamardinos, Alexa...