Sciweavers

587 search results - page 117 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
NETGAMES
2006
ACM
13 years 11 months ago
Authority assignment in distributed multi-player proxy-based games
We present a proxy-based gaming architecture and authority assignment within this architecture that can lead to better game playing experience in Massively Multi-player Online gam...
Sudhir Aggarwal, Justin Christofoli, Sarit Mukherj...
BMCBI
2008
154views more  BMCBI 2008»
13 years 5 months ago
Bayesian models and meta analysis for multiple tissue gene expression data following corticosteroid administration
Background: This paper addresses key biological problems and statistical issues in the analysis of large gene expression data sets that describe systemic temporal response cascade...
Yulan Liang, Arpad Kelemen
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 5 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 3 months ago
Imitation learning of motor primitives and language bootstrapping in robots
Abstract— Imitation learning in robots, also called programing by demonstration, has made important advances in recent years, allowing humans to teach context dependant motor ski...
Thomas Cederborg, Pierre-Yves Oudeyer
ACL
2010
13 years 3 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder