Sciweavers

96 search results - page 15 / 20
» expert 1998
Sort
View
AAAI
1998
13 years 9 months ago
Bayesian Network Models for Generation of Crisis Management Training Scenarios
We present a noisy-OR Bayesian network model for simulation-based training, and an efficient search-based algorithm for automatic synthesis of plausible training scenarios from co...
Eugene Grois, William H. Hsu, Mikhail Voloshin, Da...
BILDMED
1998
116views Algorithms» more  BILDMED 1998»
13 years 9 months ago
Computer aided diagnosis of bone lesions in the facial skeleton
We present a system for computer aided diagnosis of bone tumors in the facial skeleton. There are many di erent lesions with radiographic manifestation in the jaws. Our system help...
Wolfgang Sörgel, Sabine Girod, Martin Szummer...
ICISC
1998
132views Cryptology» more  ICISC 1998»
13 years 9 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
NIPS
1998
13 years 9 months ago
SMEM Algorithm for Mixture Models
When learning a mixture model, we suffer from the local optima and model structure determination problems. In this paper, we present a method for simultaneously solving these prob...
Naonori Ueda, Ryohei Nakano, Zoubin Ghahramani, Ge...
PROLAMAT
1998
13 years 9 months ago
Design Knowledge Collection by Modeling
Since design is a process in which designers use various kinds of knowledge and it is an open-ended problem, it is difficult to prepare all necessary knowledge before design. Also...
Masaharu Yoshioka, T. Sekiya, Tetsuo Tomiyama