Sciweavers

4544 search results - page 882 / 909
» Reinforcement Learning with Time
Sort
View
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
14 years 3 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
INFOVIS
2003
IEEE
14 years 3 months ago
Between Aesthetics and Utility: Designing Ambient Information Visualizations
Unlike traditional information visualization, ambient information visualizations reside in the environment of the user rather than on the screen of a desktop computer. Currently, ...
Tobias Skog, Sara Ljungblad, Lars Erik Holmquist
ISCC
2003
IEEE
14 years 3 months ago
Fair Noiseless Broadcast Source Coding
We present a noiseless source coding problem in a broadcast environment and supply a simple solution to this problem. A transmitter wishes to transmit a binary random vector Ò ½...
Serdar Boztas
SIGGRAPH
2003
ACM
14 years 3 months ago
Animating art history: building a bridge between disciplines
The study of art history is an exciting and rewarding one, but one in which the student frequently encounters complex and difficult to understand concepts. Traditional methodologi...
LiQin Tan, Roberta K. Tarbell, Robert Wuilfe
EDBT
2010
ACM
151views Database» more  EDBT 2010»
14 years 3 months ago
Warm cache costing: a feedback optimization technique for buffer pool aware costing
Most modern RDBMS depend on the query processing optimizer’s cost model to choose the best execution plan for a given query. Since the physical IO (PIO) is a costly operation to...
H. S. Ramanujam, Edwin Seputis