Sciweavers

1486 search results - page 289 / 298
» Firewall Rules Analysis
Sort
View
ESANN
2007
14 years 11 months ago
Toward a robust 2D spatio-temporal self-organization
Abstract. Several models have been proposed for spatio-temporal selforganization, among which the TOM model by Wiemer [1] is particularly promising. In this paper, we propose to ad...
Thomas Girod, Laurent Bougrain, Frédé...
IJCAI
2007
14 years 11 months ago
Document Summarization Using Conditional Random Fields
Many methods, including supervised and unsupervised algorithms, have been developed for extractive document summarization. Most supervised methods consider the summarization task ...
Dou Shen, Jian-Tao Sun, Hua Li, Qiang Yang, Zheng ...
NIPS
2007
14 years 11 months ago
A New View of Automatic Relevance Determination
Automatic relevance determination (ARD) and the closely-related sparse Bayesian learning (SBL) framework are effective tools for pruning large numbers of irrelevant features leadi...
David P. Wipf, Srikantan S. Nagarajan
AAAI
2006
14 years 11 months ago
Collective Construction Using Lego Robots
hibition: Extended Abstract Social insects, such as ants and termites, collectively build large and complex structures, with many individuals following simple rules and no centrali...
Crystal Schuil, Matthew Valente, Justin Werfel, Ra...
SCS
2004
14 years 11 months ago
HazLog: Tool Support for Hazard Management
Industry is increasingly adopting software and system safety standards that mandate the use of hazard logs in the development and operation of safety critical systems. Hazard logs...
Christian Hamoy, David Hemer, Peter A. Lindsay