Sciweavers

1421 search results - page 141 / 285
» The First and Second Max-SAT Evaluations
Sort
View
CIG
2005
IEEE
14 years 3 months ago
Building Reactive Characters for Dynamic Gaming Environments
Interactive computer games are widely seen as a killer application domain for Artificial Intelligence (AI) [8]. Quite apart from the significant size of the games market in terms...
Peter Blackburn, Barry O'Sullivan
ICDCSW
2005
IEEE
14 years 3 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
ICDCSW
2005
IEEE
14 years 3 months ago
Forensix: A Robust, High-Performance Reconstruction System
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...
ICMCS
2005
IEEE
90views Multimedia» more  ICMCS 2005»
14 years 3 months ago
Integrating co-training and recognition for text detection
Training a good text detector requires a large amount of labeled data, which can be very expensive to obtain. Cotraining has been shown to be a powerful semi-supervised learning t...
Wen Wu, Datong Chen, Jie Yang
ICNP
2005
IEEE
14 years 3 months ago
Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer Networks
In unstructured peer-to-peer networks, controlled flooding aims at locating an item at the minimum message cost. Dynamic querying is a new controlled flooding technique. While i...
Hongbo Jiang, Shudong Jin