Sciweavers

3830 search results - page 553 / 766
» From Reference Model to Component Model
Sort
View
133
Voted
AUSFORENSICS
2004
15 years 4 months ago
Generalising Event Forensics Across Multiple Domains
In cases involving computer related crime, event oriented evidence such as computer event logs, and telephone call records are coming under increased scrutiny. The amount of techn...
Bradley Schatz, George M. Mohay, Andrew Clark
125
Voted
NIPS
2004
15 years 4 months ago
Active Learning for Anomaly and Rare-Category Detection
We introduce a novel active-learning scenario in which a user wants to work with a learning algorithm to identify useful anomalies. These are distinguished from the traditional st...
Dan Pelleg, Andrew W. Moore
145
Voted
UAI
2000
15 years 4 months ago
Utilities as Random Variables: Density Estimation and Structure Discovery
Decision theory does not traditionally include uncertainty over utility functions. We argue that the a person's utility value for a given outcome can be treated as we treat o...
Urszula Chajewska, Daphne Koller
CORR
2008
Springer
104views Education» more  CORR 2008»
15 years 3 months ago
Secrecy capacity of a class of orthogonal relay eavesdropper channels
The secrecy capacity is developed for a class of relay channels with orthogonal components and a passive eavesdropper node. The relay and destination receive signals from the sourc...
Vaneet Aggarwal, Lalitha Sankar, A. Robert Calderb...
JCO
2006
126views more  JCO 2006»
15 years 3 months ago
Combinatorics of TCP reordering
We study a combinatorial problem motivated by a receiver-oriented model of TCP traffic from [7], that incorporates information on both arrival times, and the dynamics of packet IDs...
Anders Hansson, Gabriel Istrate, Shiva Prasad Kasi...