Sciweavers

2922 search results - page 529 / 585
» Scalable Algorithms for Distribution Search
Sort
View
NSPW
2004
ACM
14 years 1 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
SAC
2004
ACM
14 years 1 months ago
Propositional planning in BDI agents
This paper aims to describe the relationship between propositional planning systems and the process of means-end reasoning used by BDI agents. To show such relationship, we defin...
Felipe Rech Meneguzzi, Avelino F. Zorzo, Michael d...
ATAL
2003
Springer
14 years 29 days ago
Recommender systems: a market-based design
Recommender systems have been widely advocated as a way of coping with the problem of information overload for knowledge workers. Given this, multiple recommendation methods have ...
Yan Zheng Wei, Luc Moreau, Nicholas R. Jennings
KDD
1998
ACM
145views Data Mining» more  KDD 1998»
13 years 12 months ago
Coincidence Detection: A Fast Method for Discovering Higher-Order Correlations in Multidimensional Data
Wepresent a novel, fast methodfor associationminingill high-dimensionaldatasets. OurCoincidence Detection method, which combines random sampling and Chernoff-Hoeffding bounds with...
Evan W. Steeg, Derek A. Robinson, Ed Willis
ADBIS
2006
Springer
165views Database» more  ADBIS 2006»
13 years 11 months ago
Fragmenting XML Documents via Structural Constraints
Abstract. XML query processors suffer from main-memory limitations that prevent them from processing large XML documents. While content-based predicates can be used to project down...
Angela Bonifati, Alfredo Cuzzocrea, Bruno Zinno