Sciweavers

726 search results - page 45 / 146
» From Anomaly Reports to Cases
Sort
View
UAI
2008
15 years 1 months ago
A Game-Theoretic Analysis of Updating Sets of Probabilities
We consider how an agent should update her uncertainty when it is represented by a set P of probability distributions and the agent observes that a random variable X takes on valu...
Peter Grünwald, Joseph Y. Halpern
CCE
2004
14 years 11 months ago
New measures and procedures to manage financial risk with applications to the planning of gas commercialization in Asia
This paper presents some new concepts and procedures for financial risk management. To complement the use of value at risk a new concept, upside potential or opportunity value as ...
Ahmed Aseeri, Miguel J. Bagajewicz
JMLR
2010
185views more  JMLR 2010»
14 years 6 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
FCCM
2007
IEEE
146views VLSI» more  FCCM 2007»
15 years 6 months ago
Mitrion-C Application Development on SGI Altix 350/RC100
This paper provides an evaluation of SGI® RASC™ RC100 technology from a computational science software developer’s perspective. A brute force implementation of a two-point an...
Volodymyr V. Kindratenko, Robert J. Brunner, Adam ...
ECCV
1998
Springer
15 years 4 months ago
On Degeneracy of Linear Reconstruction from Three Views: Linear Line Complex and Applications
This paper investigates the linear degeneracies of projective structure estimation from point and line features across three views. We show that the rank of the linear system of e...
Gideon P. Stein, Amnon Shashua