Sciweavers

306 search results - page 17 / 62
» Underspecified computation of normal forms
Sort
View
JELIA
2004
Springer
14 years 27 days ago
Representation and Complexity in Boolean Games
Boolean games are a class of two-player games which may be defined via a Boolean form over a set of atomic actions. A particular game on some form is instantiated by partitioning ...
Paul E. Dunne, Wiebe van der Hoek
AINA
2007
IEEE
13 years 7 months ago
Detecting Anomaly Node Behavior in Wireless Sensor Networks
Wireless sensor networks are usually deployed in a way “once deployed, never changed”. The actions of sensor nodes are either pre-scheduled inside chips or triggered to respon...
Qinghua Wang, Tingting Zhang
DSN
2002
IEEE
14 years 15 days ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend
INTERNET
2010
141views more  INTERNET 2010»
13 years 6 months ago
Computing for Human Experience: Semantics-Empowered Sensors, Services, and Social Computing on the Ubiquitous Web
abstractions, concepts, and actions that characterize human experiences. This will herald computing for human experience (CHE). The CHE vision is built on a suite of technologies t...
Amit Sheth
JMLR
2012
11 years 10 months ago
Noise-Contrastive Estimation of Unnormalized Statistical Models, with Applications to Natural Image Statistics
We consider the task of estimating, from observed data, a probabilistic model that is parameterized by a finite number of parameters. In particular, we are considering the situat...
Michael Gutmann, Aapo Hyvärinen