Sciweavers

1349 search results - page 106 / 270
» Models for Incomplete and Probabilistic Information
Sort
View
AAAI
2006
15 years 5 months ago
Sensor-Based Understanding of Daily Life via Large-Scale Use of Common Sense
The use of large quantities of common sense has long been thought to be critical to the automated understanding of the world. To this end, various groups have collected repositori...
William Pentney, Ana-Maria Popescu, Shiaokai Wang,...
SCN
2008
Springer
157views Communications» more  SCN 2008»
15 years 4 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
SIGIR
2011
ACM
14 years 7 months ago
Collective topic modeling for heterogeneous networks
In this paper, we propose a joint probabilistic topic model for simultaneously modeling the contents of multi-typed objects of a heterogeneous information network. The intuition b...
Hongbo Deng, Bo Zhao, Jiawei Han
SEMWEB
2009
Springer
15 years 11 months ago
Probabilistic Ontology and Knowledge Fusion for Procurement Fraud Detection in Brazil
To cope with society’s demand for transparency and corruption prevention, the Brazilian Office of the Comptroller General (CGU) has carried out a number of actions, including: aw...
Rommel N. Carvalho, Kathryn B. Laskey, Paulo Cesar...
IH
2007
Springer
15 years 10 months ago
A Graph Game Model for Software Tamper Protection
We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an atta...
Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Ve...