Sciweavers

1126 search results - page 140 / 226
» Modularity and the Rule of Adaptation
Sort
View
CLEAR
2007
Springer
145views Biometrics» more  CLEAR 2007»
14 years 5 months ago
Multi-person Tracking Strategies Based on Voxel Analysis
Abstract. This paper presents two approaches to the problem of simultaneous tracking of several people in low resolution sequences from multiple calibrated cameras. Spatial redunda...
Cristian Canton-Ferrer, Jordi Salvador, Josep R. C...
IWCLS
2007
Springer
14 years 5 months ago
On Lookahead and Latent Learning in Simple LCS
Learning Classifier Systems use evolutionary algorithms to facilitate rule- discovery, where rule fitness is traditionally payoff based and assigned under a sharing scheme. Most c...
Larry Bull
OTM
2005
Springer
14 years 4 months ago
OWL-Based User Preference and Behavior Routine Ontology for Ubiquitous System
In ubiquitous computing, behavior routine learning is the process of mining the context-aware data to find interesting rules on the user’s behavior, while preference learning tri...
Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 3 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ECAI
1992
Springer
14 years 3 months ago
A Strategy for the Computation of Conditional Answers
We consider non-Horn Deductive Data Bases (DDB) represented in a First Order language without function symbols. In this context the DDB is an incomplete description of the world. ...
Robert Demolombe