Sciweavers

304 search results - page 41 / 61
» Towards a Cooperative Transaction Model - The Cooperative Ac...
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 4 days ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
EDOC
1997
IEEE
14 years 2 days ago
Tele-Education Process Modelling Supported by The ODP Enterprise Viewpoint Language
This paper reports on applying the ODP enterprise viewpoint in the domain of tele-education. The work is conducted as part of a research activity1 that aims at designing a tele-ed...
Cees Volman, Val Jones, Marten van Sinderen, Ing W...
ECML
2004
Springer
14 years 1 months ago
Analyzing Multi-agent Reinforcement Learning Using Evolutionary Dynamics
In this paper, we show how the dynamics of Q-learning can be visualized and analyzed from a perspective of Evolutionary Dynamics (ED). More specifically, we show how ED can be use...
Pieter Jan't Hoen, Karl Tuyls
ACSAC
2002
IEEE
14 years 25 days ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
IJON
2007
76views more  IJON 2007»
13 years 7 months ago
Modeling L-LTP based on changes in concentration of pCREB transcription factor
We simulate the induction and maintenance of late long-term potentiation (L-LTP) in the hippocampal dentate gyrus by means of a new synaptic plasticity rule that is the result of ...
Lubica Benuskova, Nikola Kasabov