Sciweavers

591 search results - page 14 / 119
» Simulation Input Updating Using Bayesian Techniques
Sort
View
JAIR
2010
181views more  JAIR 2010»
13 years 3 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
ICC
2007
IEEE
102views Communications» more  ICC 2007»
14 years 2 months ago
Use of Fuzzy Bayesian Clustering to Enhance Generalization Capacity of Radio Network Planning Tool
— To enhance the generalization capacity of a distribution learning method, we propose to use a fuzzy Bayesian framework based on Bayes rules. The precision of the learning resul...
Zakaria Nouir, Berna Sayraç, Benoît F...
IVA
2009
Springer
14 years 3 months ago
GNetIc - Using Bayesian Decision Networks for Iconic Gesture Generation
Expressing spatial information with iconic gestures is abundant in human communication and requires to transform a referent representation into resembling gestural form. This task ...
Kirsten Bergmann, Stefan Kopp
SIGGRAPH
1994
ACM
14 years 15 days ago
Frameless rendering: double buffering considered harmful
The use of double-buffered displays, in which the previous image is displayed until the next image is complete, can impair the interactivity of systems that require tight coupling...
Gary Bishop, Henry Fuchs, Leonard McMillan, Ellen ...
LCPC
2004
Springer
14 years 1 months ago
Phase-Based Miss Rate Prediction Across Program Inputs
Previous work shows the possibility of predicting the cache miss rate (CMR) for all inputs of a program. However, most optimization techniques need to know more than the miss rate ...
Xipeng Shen, Yutao Zhong, Chen Ding