Sciweavers

457 search results - page 77 / 92
» A Multiple Model Cost-Sensitive Approach for Intrusion Detec...
Sort
View
77
Voted
IJCV
2008
151views more  IJCV 2008»
14 years 9 months ago
Describing Visual Scenes Using Transformed Objects and Parts
We develop hierarchical, probabilistic models for objects, the parts composing them, and the visual scenes surrounding them. Our approach couples topic models originally developed...
Erik B. Sudderth, Antonio Torralba, William T. Fre...
PAKDD
2004
ACM
137views Data Mining» more  PAKDD 2004»
15 years 2 months ago
Fast and Light Boosting for Adaptive Mining of Data Streams
Supporting continuous mining queries on data streams requires algorithms that (i) are fast, (ii) make light demands on memory resources, and (iii) are easily to adapt to concept dr...
Fang Chu, Carlo Zaniolo
112
Voted
ECSA
2011
Springer
13 years 9 months ago
Architecture-Based Run-Time Fault Diagnosis
Abstract. An important step in achieving robustness to run-time faults is the ability to detect and repair problems when they arise in a running system. Effective fault detection a...
Paulo Casanova, Bradley R. Schmerl, David Garlan, ...
WSDM
2010
ACM
210views Data Mining» more  WSDM 2010»
15 years 7 months ago
Towards Recency Ranking in Web Search
In web search, recency ranking refers to ranking documents by relevance which takes freshness into account. In this paper, we propose a retrieval system which automatically detect...
Anlei Dong, Yi Chang, Zhaohui Zheng, Gilad Mishne,...
AAAI
1998
14 years 11 months ago
What Is Wrong With Us? Improving Robustness Through Social Diagnosis
1 Robust behavior in complex, dynamic environments mandates that intelligent agents autonomously monitor their own run-time behavior, detect and diagnose failures, and attempt reco...
Gal A. Kaminka, Milind Tambe