Sciweavers

4815 search results - page 798 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
ACSAC
2004
IEEE
15 years 7 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
ATAL
2010
Springer
15 years 5 months ago
Establishing spatially targeted communication in a heterogeneous robot swarm
We consider a heterogeneous swarm consisting of aerial and wheeled robots. We present a system that enables spatially targeted communication. Our system enables aerial robots to e...
Nithin Mathews, Anders Lyhne Christensen, Eliseo F...
BMCBI
2008
138views more  BMCBI 2008»
15 years 4 months ago
CASCADE: a novel quasi all paths-based network analysis algorithm for clustering biological interactions
Background: Quantitative characterization of the topological characteristics of protein-protein interaction (PPI) networks can enable the elucidation of biological functional modu...
Woochang Hwang, Young-Rae Cho, Aidong Zhang, Mural...
WWW
2008
ACM
16 years 4 months ago
Online learning from click data for sponsored search
Sponsored search is one of the enabling technologies for today's Web search engines. It corresponds to matching and showing ads related to the user query on the search engine...
Massimiliano Ciaramita, Vanessa Murdock, Vassilis ...
NORDICHI
2004
ACM
15 years 9 months ago
Facilitating user interface adaptation to mobile devices
One vision of a context-aware pervasive networking environment promises the user a seamless access to surrounding services using her personal mobile device. This requires that the...
Pertti Repo