Sciweavers

529 search results - page 68 / 106
» ideas 2003
Sort
View
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
14 years 3 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
GROUP
2003
ACM
14 years 3 months ago
Information seeking and sharing in design teams
Information retrieval is generally considered an individual activity, and information retrieval research and tools reflect this view. As digitally mediated communication and infor...
Steven E. Poltrock, Jonathan Grudin, Susan T. Duma...
ICML
2003
IEEE
14 years 3 months ago
The Influence of Reward on the Speed of Reinforcement Learning: An Analysis of Shaping
Shaping can be an effective method for improving the learning rate in reinforcement systems. Previously, shaping has been heuristically motivated and implemented. We provide a for...
Adam Laud, Gerald DeJong
IUI
2003
ACM
14 years 3 months ago
DJ-boids: emergent collective behavior as multichannel radio station programming
In this paper we propose to apply emergent collective behavior ideas to automatically program Internet multichannel radio stations. The proposed model simulates n virtual Dj'...
Jesús Ibáñez, Antonio F. G&oa...
IUI
2003
ACM
14 years 3 months ago
Sticky notes for the semantic web
Computer-based annotation is increasing in popularity as a mechanism for revising documents and sharing comments over the Internet. One reason behind this surge is that viewpoints...
David R. Karger, Boris Katz, Jimmy J. Lin, Dennis ...