Sciweavers

1486 search results - page 279 / 298
» Firewall Rules Analysis
Sort
View
ALT
2009
Springer
15 years 8 months ago
Average-Case Active Learning with Costs
Abstract. We analyze the expected cost of a greedy active learning algorithm. Our analysis extends previous work to a more general setting in which different queries have differe...
Andrew Guillory, Jeff A. Bilmes
EDBTW
2010
Springer
15 years 6 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
CEC
2009
IEEE
15 years 6 months ago
Evolving morphology and control: A distributed approach
—In this paper we present a model which allows to co-evolve the morphology and the control system of realistically simulated robots (creatures). The method proposed is based on a...
Mariagiovanna Mazzapioda, Angelo Cangelosi, Stefan...
LICS
2009
IEEE
15 years 6 months ago
The Structure of First-Order Causality
Game semantics describe the interactive behavior of proofs by interpreting formulas as games on which proofs induce strategies. Such a semantics is introduced here for capturing d...
Samuel Mimram
ATAL
2009
Springer
15 years 6 months ago
A memetic framework for describing and simulating spatial prisoner's dilemma with coalition formation
This paper presents a framework for describing the spatial distribution and the global frequency of agents who play the spatial prisoner’s dilemma with coalition formation. The ...
Juan C. Burguillo-Rial