Sciweavers

9231 search results - page 1688 / 1847
» informs 2008
Sort
View
143
Voted
COMCOM
2008
120views more  COMCOM 2008»
15 years 3 months ago
Game theoretic models for detecting network intrusions
In this paper, we study using game theory the problem of detecting intrusions in wired infrastructure networks. Detection is accomplished by sampling a subset of the transmitted p...
Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad De...
136
Voted
CONNECTION
2008
178views more  CONNECTION 2008»
15 years 3 months ago
Spoken language interaction with model uncertainty: an adaptive human-robot interaction system
Spoken language is one of the most intuitive forms of interaction between humans and agents. Unfortunately, agents that interact with people using natural language often experienc...
Finale Doshi, Nicholas Roy
149
Voted
CSDA
2008
128views more  CSDA 2008»
15 years 3 months ago
Classification tree analysis using TARGET
Tree models are valuable tools for predictive modeling and data mining. Traditional tree-growing methodologies such as CART are known to suffer from problems including greediness,...
J. Brian Gray, Guangzhe Fan
CVIU
2008
124views more  CVIU 2008»
15 years 3 months ago
Measuring novelty and redundancy with multiple modalities in cross-lingual broadcast news
News videos from different channels, languages are broadcast everyday, which provide abundant information for users. To effectively search, retrieve, browse and track news stories...
Xiao Wu, Alexander G. Hauptmann, Chong-Wah Ngo
DB
2008
73views more  DB 2008»
15 years 3 months ago
Environmental influences on gender in the IT workforce
In an effort to better understand the underrepresentation of women within the IT profession, one promising line of investigation is the influence of factors in the socio-cultural ...
Eileen M. Trauth, Jeria L. Quesenberry, Benjamin Y...
« Prev « First page 1688 / 1847 Last » Next »