Sciweavers

1167 search results - page 157 / 234
» Relational Markov Games
Sort
View
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
14 years 2 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
APLAS
2007
ACM
14 years 2 months ago
A Systematic Approach to Probabilistic Pointer Analysis
Abstract. We present a formal framework for syntax directed probabilistic program analysis. Our focus is on probabilistic pointer analysis. We show how to obtain probabilistic poin...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
COMPLEX
2009
Springer
14 years 1 months ago
Non-sufficient Memories That Are Sufficient for Prediction
The causal states of computational mechanics define the minimal sufficient (prescient) memory for a given stationary stochastic process. They induce the -machine which is a hidden...
Wolfgang Löhr, Nihat Ay
BIOADIT
2004
Springer
14 years 1 months ago
Biologically Plausible Speech Recognition with LSTM Neural Nets
Abstract. Long Short-Term Memory (LSTM) recurrent neural networks (RNNs) are local in space and time and closely related to a biological model of memory in the prefrontal cortex. N...
Alex Graves, Douglas Eck, Nicole Beringer, Jü...
AUSAI
2008
Springer
14 years 1 hour ago
Learning Object Representations Using Sequential Patterns
This paper explores the use of alternating sequential patterns of local features and saccading actions to learn robust and compact object representations. The temporal encoding rep...
Nobuyuki Morioka