Sciweavers

446 search results - page 77 / 90
» Active Pages: A Computation Model for Intelligent Memory
Sort
View
IDEAL
2010
Springer
14 years 7 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
84
Voted
EXPERT
2011
131views more  EXPERT 2011»
14 years 28 days ago
Grid Monitoring and Market Risk Management
—With the rapid development of the electricity market, both grid and market operations need to be carefully coordinated and monitored in real time. This paper focuses on system m...
Yufan Guan, Mladen Kezunovic
92
Voted
AUSAI
2006
Springer
15 years 1 months ago
Robust Character Recognition Using a Hierarchical Bayesian Network
There is increasing evidence to suggest that the neocortex of the mammalian brain does not consist of a collection of specialised and dedicated cortical architectures, but instead ...
John Thornton, Torbjorn Gustafsson, Michael Blumen...
ECML
1991
Springer
15 years 29 days ago
Learning by Analogical Replay in PRODIGY: First Results
Robust reasoning requires learning from problem solving episodes. Past experience must be compiled to provide adaptation to new contingencies and intelligent modification of solut...
Manuela M. Veloso, Jaime G. Carbonell
ATAL
2009
Springer
15 years 4 months ago
Graph-based methods for the analysis of large-scale multiagent systems
Multiagent systems are often characterized by complex, and sometimes unpredictable interactions amongst their autonomous components. While these systems can provide robust and sca...
Wilbur Peng, William Krueger, Alexander Grushin, P...