Sciweavers

1455 search results - page 236 / 291
» Exploiting Myopic Learning
Sort
View
ISMIS
2005
Springer
15 years 8 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
NLDB
2005
Springer
15 years 8 months ago
Combining Data-Driven Systems for Improving Named Entity Recognition
Abstract. The increasing flow of digital information requires the extraction, filtering and classification of pertinent information from large volumes of texts. An important pre...
Zornitsa Kozareva, Óscar Ferrández, ...
VRCAI
2004
ACM
15 years 8 months ago
A web-based system for interactive visualization of scientific concepts
ion visualization is valuable in learning abstract ideas and new concepts. The existing technology for publishing online papers is lacking in terms of user interaction as well as ...
Ker Sin Neo, Qingping Lin, Robert K. L. Gay
ARCS
2004
Springer
15 years 8 months ago
Latent Semantic Indexing in Peer-to-Peer Networks
Searching in decentralized peer-to-peer networks is a challenging problem. In common applications such as Gnutella, searching is performed by randomly forwarding queries to all pee...
Xuezheng Liu, Ming Chen, Guangwen Yang
ATAL
2004
Springer
15 years 8 months ago
Product Distribution Theory for Control of Multi-Agent Systems
Product Distribution (PD) theory is a new framework for controlling Multi-Agent Systems (MAS’s). First we review one motivation of PD theory, as the information-theoretic extens...
Chiu Fan Lee, David H. Wolpert