Sciweavers

11182 search results - page 2148 / 2237
» Shape Analysis of Sets
Sort
View
AINA
2004
IEEE
15 years 7 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
115
Voted
AIPR
2004
IEEE
15 years 7 months ago
Feasibility Study for the Development of a Motion Imagery Quality Metric
The motion imagery community would benefit from the availability of standard measures for assessing image interpretability. The National Imagery Interpretability Rating Scale (NII...
John M. Irvine, Charles Fenimore, David M. Cannon,...
137
Voted
ATAL
2006
Springer
15 years 7 months ago
The communication complexity of coalition formation among autonomous agents
It is self-evident that in numerous Multiagent settings, selfish agents stand to benefit from cooperating by forming coalitions. Nevertheless, negotiating a stable distribution of...
Ariel D. Procaccia, Jeffrey S. Rosenschein
158
Voted
BALT
2006
15 years 7 months ago
Introducing Softness into Inductive Queries on String Databases
In many application domains (e.g., WWW mining, molecular biology), large string datasets are available and yet under-exploited. The inductive database framework assumes that both s...
Ieva Mitasiunaite, Jean-François Boulicaut
126
Voted
CCS
2006
ACM
15 years 7 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
« Prev « First page 2148 / 2237 Last » Next »