Sciweavers

20017 search results - page 3959 / 4004
» Using personas effectively
Sort
View
IJNSEC
2006
96views more  IJNSEC 2006»
13 years 9 months ago
A Memory Symptom-based Virus Detection Approach
The widespread use of the Internet has caused computer security to become an important issue. Currently, antivirus software is the primary mechanism that prevents computers from t...
Hsien-Chou Liao, Yi-Hsiang Wang
JAIR
2008
148views more  JAIR 2008»
13 years 9 months ago
Learning Partially Observable Deterministic Action Models
We present exact algorithms for identifying deterministic-actions' effects and preconditions in dynamic partially observable domains. They apply when one does not know the ac...
Eyal Amir, Allen Chang
CORR
2007
Springer
63views Education» more  CORR 2007»
13 years 9 months ago
Optimizing the SINR operating point of spatial networks
— This paper addresses the following question, which is of interest in the design and deployment of a multiuser decentralized network. Given a total system bandwidth of W Hz and ...
Nihar Jindal, Jeffrey G. Andrews, Steven Weber
JCST
2008
121views more  JCST 2008»
13 years 9 months ago
Clustering Text Data Streams
Abstract Clustering text data streams is an important issue in data mining community and has a number of applications such as news group filtering, text crawling, document organiza...
Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu
IPM
2006
84views more  IPM 2006»
13 years 9 months ago
Qualitative evaluation of automatic assignment of keywords to images
In image retrieval, most systems lack user-centred evaluation since they are assessed by some chosen ground truth dataset. The results reported through precision and recall assess...
Chih-Fong Tsai, Kenneth McGarry, John Tait
« Prev « First page 3959 / 4004 Last » Next »