Sciweavers

9886 search results - page 1836 / 1978
» Learning Compressible Models
Sort
View
115
Voted
ACSAC
2003
IEEE
15 years 9 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
116
Voted
HICSS
2003
IEEE
159views Biometrics» more  HICSS 2003»
15 years 9 months ago
Building a Knowledge Sharing Company - Evidence From the Finnish Insurance Industry
This paper crystallises out some key findings of knowledge management practices from a Finnish survey on the insurance industry. 15 Finnish insurance companies of different sizes ...
Gunilla Widén-Wulff, Reima Suomi
122
Voted
ICDM
2003
IEEE
158views Data Mining» more  ICDM 2003»
15 years 9 months ago
Combining Multiple Weak Clusterings
A data set can be clustered in many ways depending on the clustering algorithm employed, parameter settings used and other factors. Can multiple clusterings be combined so that th...
Alexander P. Topchy, Anil K. Jain, William F. Punc...
157
Voted
ICDM
2003
IEEE
210views Data Mining» more  ICDM 2003»
15 years 9 months ago
CBC: Clustering Based Text Classification Requiring Minimal Labeled Data
Semi-supervised learning methods construct classifiers using both labeled and unlabeled training data samples. While unlabeled data samples can help to improve the accuracy of trai...
Hua-Jun Zeng, Xuanhui Wang, Zheng Chen, Hongjun Lu...
151
Voted
ICRA
2003
IEEE
160views Robotics» more  ICRA 2003»
15 years 9 months ago
Adapting navigation strategies using motions patterns of people
— As people move through their environments, they do not move randomly. Instead, they are often engaged in typical motion patterns, related to specific locations they might be i...
Maren Bennewitz, Wolfram Burgard, Sebastian Thrun
« Prev « First page 1836 / 1978 Last » Next »