Sciweavers

1329 search results - page 249 / 266
» Models and solution techniques for frequency assignment prob...
Sort
View
CVPR
2006
IEEE
15 years 11 months ago
Correlated Label Propagation with Application to Multi-label Learning
Many computer vision applications, such as scene analysis and medical image interpretation, are ill-suited for traditional classification where each image can only be associated w...
Feng Kang, Rong Jin, Rahul Sukthankar
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
15 years 10 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
IPPS
2009
IEEE
15 years 4 months ago
Robust sequential resource allocation in heterogeneous distributed systems with random compute node failures
—The problem of finding efficient workload distribution techniques is becoming increasingly important today for heterogeneous distributed systems where the availability of comp...
Vladimir Shestak, Edwin K. P. Chong, Anthony A. Ma...
CSFW
2008
IEEE
15 years 3 months ago
Language Based Secure Communication
Secure communication in distributed systems is notoriously hard to achieve due to the variety of attacks an adversary can mount, based on message interception, modification, redi...
Michele Bugliesi, Riccardo Focardi
WCNC
2008
IEEE
15 years 3 months ago
Using Swarm Intelligence and Bayesian Inference for Aircraft Interrogation
: Sensor management deals with the efficient resource allocation to meet mission objectives of the application, air traffic control. A schedule for the sensors is constructed, whic...
Ganapathi Kamath, Xiang Ye, Lisa Ann Osadciw