Sciweavers

1275 search results - page 136 / 255
» time 1998
Sort
View
ICMLA
2003
13 years 10 months ago
Robust Support Vector Machines for Anomaly Detection in Computer Security
— Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared...
Wenjie Hu, Yihua Liao, V. Rao Vemuri
AAAI
1998
13 years 10 months ago
A Tractable Walsh Analysis of SAT and its Implications for Genetic Algorithms
Walsh Transforms measure all sources of nonlinear interactions for functions that have a bit representation. There can be exponentially many nonlinear interactions and exactly com...
Soraya B. Rana, Robert B. Heckendorn, L. Darrell W...
AAAI
1998
13 years 10 months ago
Abductive Planning with Sensing
In abductive planning, plans are constructed as reasons for an agent to act: plans are demonstrations in logical theory of action that a goal will result assuming that given actio...
Matthew Stone
ACL
1998
13 years 10 months ago
Consonant Spreading in Arabic Stems
This paper examines the phenomenon of consonant spreading in Arabic stems. Each spreading involves a local surface copying of an underlying consonant, and, in certain phonological...
Kenneth R. Beesley
ACL
1998
13 years 10 months ago
Entity-Based Cross-Document Coreferencing Using the Vector Space Model
Cross-document coreference occurs when the same person, place, event, or concept is discussed in more than one text source. Computer recognition of this phenomenon is important be...
Amit Bagga, Breck Baldwin