Sciweavers

4285 search results - page 726 / 857
» Differential Behavioral Analysis
Sort
View
87
Voted
NSPW
2004
ACM
15 years 6 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
89
Voted
SIGECOM
2004
ACM
135views ECommerce» more  SIGECOM 2004»
15 years 6 months ago
Applying learning algorithms to preference elicitation
We consider the parallels between the preference elicitation problem in combinatorial auctions and the problem of learning an unknown function from learning theory. We show that l...
Sébastien Lahaie, David C. Parkes
102
Voted
SIGIR
2004
ACM
15 years 6 months ago
Display time as implicit feedback: understanding task effects
Recent research has had some success using the length of time a user displays a document in their web browser as implicit feedback for document preference. However, most studies h...
Diane Kelly, Nicholas J. Belkin
ECML
2004
Springer
15 years 6 months ago
Analyzing Multi-agent Reinforcement Learning Using Evolutionary Dynamics
In this paper, we show how the dynamics of Q-learning can be visualized and analyzed from a perspective of Evolutionary Dynamics (ED). More specifically, we show how ED can be use...
Pieter Jan't Hoen, Karl Tuyls
EGH
2004
Springer
15 years 6 months ago
A flexible simulation framework for graphics architectures
In this paper we describe a multipurpose tool for analysis of the performance characteristics of computer graphics hardware and software. We are developing Qsilver, a highly con...
Jeremy W. Sheaffer, David P. Luebke, Kevin Skadron