Sciweavers

2357 search results - page 88 / 472
» Computing Refactorings of Behavior Models
Sort
View
99
Voted
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
15 years 10 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
PARA
2004
Springer
15 years 3 months ago
Model Reduction for RF MEMS Simulation
Radio-frequency (RF) MEMS resonators, integrated into CMOS chips, are of great interest to engineers planning the next generation of communication systems. Fast simulations are nec...
David Bindel, Zhaojun Bai, James Demmel
KDD
2012
ACM
179views Data Mining» more  KDD 2012»
13 years 18 days ago
Transparent user models for personalization
Personalization is a ubiquitous phenomenon in our daily online experience. While such technology is critical for helping us combat the overload of information we face, in many cas...
Khalid El-Arini, Ulrich Paquet, Ralf Herbrich, Jur...
ISWC
2003
IEEE
15 years 3 months ago
Sensing and Modeling Human Networks using the Sociometer
Knowledge of how people interact is important in many disciplines, e.g. organizational behavior, social network analysis, information diffusion and knowledge management applicatio...
Tanzeem Choudhury, Alex Pentland
69
Voted
ESEC
1991
Springer
15 years 1 months ago
A Dynamic Failure Model for Predicting the Impact that a Program Location has on the Program
This paper presents a dynamic technique for predicting the e ect that a location" of a program will have on the program's computational behavior. The technique is based ...
Jeffrey M. Voas