Sciweavers

14348 search results - page 2613 / 2870
» Active Database Systems
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
ATAL
2006
Springer
15 years 8 months ago
Certified reputation: how an agent can trust a stranger
Current computational trust models are usually built either on an agent's direct experience of an interaction partner (interaction trust) or reports provided by third parties...
Trung Dong Huynh, Nicholas R. Jennings, Nigel R. S...
DSMML
2004
Springer
15 years 8 months ago
Efficient Communication by Breathing
The arithmetic-coding-based communication system, Dasher, can be driven by a one-dimensional continuous signal. A belt-mounted breath-mouse, delivering a signal related to lung vol...
Tom Shorrock, David MacKay, Chris Ball
137
Voted
ECAI
2006
Springer
15 years 8 months ago
Auction Mechanisms for Efficient Advertisement Selection on Public Displays
Public electronic displays can be used as an advertising medium when space is a scarce resource, and it is desirable to expose many adverts to as wide an audience as possible. Alth...
Terry R. Payne, Esther David, Nicholas R. Jennings...
ICRA
2000
IEEE
163views Robotics» more  ICRA 2000»
15 years 8 months ago
The Anthropomorphic Biped Robot BIP2000
This paper describes the progress of the BIP2000 project. This project, in which four laboratories are involved for 4 years, as uimed at the realization of the lower part of an an...
Bernard Espiau, Philippe Sardain
« Prev « First page 2613 / 2870 Last » Next »