Sciweavers

289 search results - page 51 / 58
» Probabilistic Combination of Multiple Evidence
Sort
View
SCN
2008
Springer
157views Communications» more  SCN 2008»
13 years 7 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
MM
2009
ACM
245views Multimedia» more  MM 2009»
14 years 1 months ago
Concept detectors: how good is good enough?
Today, semantic concept based video retrieval systems often show insufficient performance for real-life applications. Clearly, a big share of the reason is the lacking performance...
Robin Aly, Djoerd Hiemstra
AAAI
2010
13 years 9 months ago
Recognizing Multi-Agent Activities from GPS Data
Recent research has shown that surprisingly rich models of human behavior can be learned from GPS (positional) data. However, most research to date has concentrated on modeling si...
Adam Sadilek, Henry A. Kautz
DC
2008
13 years 7 months ago
Fast computation by population protocols with a leader
Fast algorithms are presented for performing computations in a probabilistic population model. This is a variant of the standard population protocol model--in which finite-state ag...
Dana Angluin, James Aspnes, David Eisenstat
BMCBI
2005
113views more  BMCBI 2005»
13 years 7 months ago
Systematic survey reveals general applicability of "guilt-by-association" within gene coexpression networks
Background: Biological processes are carried out by coordinated modules of interacting molecules. As clustering methods demonstrate that genes with similar expression display incr...
Cecily J. Wolfe, Isaac S. Kohane, Atul J. Butte