Sciweavers

3333 search results - page 615 / 667
» Abstract Proof Search
Sort
View
IEEECIT
2010
IEEE
15 years 1 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
IOT
2010
15 years 1 months ago
A resource oriented architecture for the Web of Things
Abstract--Many efforts are centered around creating largescale networks of "smart things" found in the physical world (e.g., wireless sensor and actuator networks, embedd...
Dominique Guinard, Vlad Trifa, Erik Wilde
IS
2010
15 years 1 months ago
Building concepts for AI agents using information theoretic Co-clustering
Abstract--High level conceptual thought seems to be at the basis of the impressive human cognitive ability, and AI researchers aim to replicate this ability in artificial agents. C...
Jason R. Chen
PKDD
2010
Springer
125views Data Mining» more  PKDD 2010»
15 years 1 months ago
NDPMine: Efficiently Mining Discriminative Numerical Features for Pattern-Based Classification
Abstract. Pattern-based classification has demonstrated its power in recent studies, but because the cost of mining discriminative patterns as features in classification is very ex...
Hyungsul Kim, Sangkyum Kim, Tim Weninger, Jiawei H...
WAW
2010
Springer
231views Algorithms» more  WAW 2010»
15 years 1 months ago
Modeling Traffic on the Web Graph
Abstract. Analysis of aggregate and individual Web requests shows that PageRank is a poor predictor of traffic. We use empirical data to characterize properties of Web traffic not ...
Mark R. Meiss, Bruno Gonçalves, Jose J. Ram...