Sciweavers

1428 search results - page 172 / 286
» aims 2010
Sort
View
FIS
2010
15 years 4 months ago
A Provenance-Based Compliance Framework
Given the significant amount of personal information available on the Web, verifying its correct use emerges as an important issue. When personal information is published, it shoul...
Rocío Aldeco-Pérez, Luc Moreau
MM
2010
ACM
189views Multimedia» more  MM 2010»
15 years 4 months ago
Changing characters' point of view in interactive storytelling
Virtual characters are at the epicentre of Interactive Storytelling systems and in recent years multiple AI planning approaches have been described to specify their autonomous beh...
Fred Charles, Julie Porteous, Marc Cavazza
ICDE
2010
IEEE
282views Database» more  ICDE 2010»
16 years 4 months ago
Quantile-Based KNN Over Multi-Valued Objects
K Nearest Neighbor search has many applications including data mining, multi-media, image processing, and monitoring moving objects. In this paper, we study the problem of KNN over...
Wenjie Zhang, Xuemin Lin, Muhammad Aamir Cheema, Y...
ARC
2010
Springer
154views Hardware» more  ARC 2010»
15 years 4 months ago
Perspectives on system identification
: System identification is the art and science of building mathematical models of dynamic systems from observed input-output data. It can be seen as the interface between the real ...
Lennart Ljung
148
Voted
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 4 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin