Sciweavers

ICEIS
2008
IEEE
13 years 11 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
CISIS
2009
IEEE
13 years 11 months ago
Ontology-Based Generation of Bayesian Networks
Bayesian networks are indispensable for determining the probability of events which are influenced by various components. Bayesian probabilities encode degrees of belief about ce...
Stefan Fenz, A. Min Tjoa, Marcus Hudec
PERCOM
2007
ACM
14 years 4 months ago
Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection
Macro programming a distributed system, such as a sensor network, is the ability to specify application tasks at a global level while relying on compiler-like software to translat...
Marco Mamei, Radhika Nagpal
RECOMB
2003
Springer
14 years 4 months ago
Optimizing exact genetic linkage computations
Genetic linkage analysis is a challenging application which requires Bayesian networks consisting of thousands of vertices. Consequently, computing the likelihood of data, which i...
Dan Geiger, Maáyan Fishelson
KDD
2002
ACM
171views Data Mining» more  KDD 2002»
14 years 4 months ago
Mining complex models from arbitrarily large databases in constant time
In this paper we propose a scaling-up method that is applicable to essentially any induction algorithm based on discrete search. The result of applying the method to an algorithm ...
Geoff Hulten, Pedro Domingos
ICML
2004
IEEE
14 years 5 months ago
Learning Bayesian network classifiers by maximizing conditional likelihood
Bayesian networks are a powerful probabilistic representation, and their use for classification has received considerable attention. However, they tend to perform poorly when lear...
Daniel Grossman, Pedro Domingos
DAC
2003
ACM
14 years 5 months ago
Coverage directed test generation for functional verification using bayesian networks
Functional verification is widely acknowledged as the bottleneck in the hardware design cycle. This paper addresses one of the main challenges of simulation based verification (or...
Shai Fine, Avi Ziv
ICPR
2004
IEEE
14 years 5 months ago
Estimation of the Bayesian Network Architecture for Object Tracking in Video Sequences
It was recently proposed the use of Bayesian networks for object tracking. Bayesian networks allow to model the interaction among detected trajectories, in order to obtain a relia...
Arnaldo J. Abrantes, Jorge S. Marques, Pedro Mende...
ECCV
2008
Springer
14 years 6 months ago
Constrained Maximum Likelihood Learning of Bayesian Networks for Facial Action Recognition
Probabilistic graphical models such as Bayesian Networks have been increasingly applied to many computer vision problems. Accuracy of inferences in such models depends on the quali...
Cassio Polpo de Campos, Yan Tong, Qiang Ji
CVPR
2009
IEEE
15 years 7 days ago
Recognizing Linked Events: Searching the Space of Feasible Explanations
The ambiguity inherent in a localized analysis of events from video can be resolved by exploiting constraints between events and examining only feasible global explanations. We sho...
Dima Damen (University of Leeds), David Hogg (Univ...