Sciweavers

397 search results - page 38 / 80
» An empirical study of optimizations in YOGI
Sort
View
89
Voted
JCS
2002
103views more  JCS 2002»
15 years 4 days ago
Toward Cost-Sensitive Modeling for Intrusion Detection and Response
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion...
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. S...
79
Voted
IEEESP
2010
99views more  IEEESP 2010»
14 years 11 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
114
Voted
EMNLP
2009
14 years 10 months ago
Web-Scale Distributional Similarity and Entity Set Expansion
Computing the pairwise semantic similarity between all words on the Web is a computationally challenging task. Parallelization and optimizations are necessary. We propose a highly...
Patrick Pantel, Eric Crestan, Arkady Borkovsky, An...
117
Voted
AISS
2010
130views more  AISS 2010»
14 years 10 months ago
Neural Network Modeling for Proton Exchange Membrane Fuel Cell (PEMFC)
This paper presents the artificial intelligence techniques to control a proton exchange membrane fuel cell system process using particularly a methodology of dynamic neural networ...
Youssef M. ElSayed, Moataz H. Khalil, Khairia E. A...
70
Voted
JMLR
2010
134views more  JMLR 2010»
14 years 7 months ago
Half Transductive Ranking
We study the standard retrieval task of ranking a fixed set of items given a previously unseen query and pose it as the half transductive ranking problem. The task is transductive...
Bing Bai, Jason Weston, David Grangier, Ronan Coll...