Sciweavers

1024 search results - page 204 / 205
» Compositional Methods for Probabilistic Systems
Sort
View
CSREASAM
2006
13 years 7 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson
NIPS
2001
13 years 7 months ago
Global Coordination of Local Linear Models
High dimensional data that lies on or near a low dimensional manifold can be described by a collection of local linear models. Such a description, however, does not provide a glob...
Sam T. Roweis, Lawrence K. Saul, Geoffrey E. Hinto...
DAGSTUHL
1998
13 years 7 months ago
Markov Localization for Reliable Robot Navigation and People Detection
Localization is one of the fundamental problems in mobile robotics. Without knowledge about their position mobile robots cannot e ciently carry out their tasks. In this paper we pr...
Dieter Fox, Wolfram Burgard, Sebastian Thrun
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 5 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
TMI
2011
144views more  TMI 2011»
13 years 16 days ago
Automated Mitosis Detection of Stem Cell Populations in Phase-Contrast Microscopy Images
—Due to the enormous potential and impact that stem cells may have on regenerative medicine, there has been a rapidly growing interest for tools to analyze and characterize the b...
Seungil Huh, Dai Fei E. Ker, Ryoma Bise, Mei Chen,...