Sciweavers

1863 search results - page 300 / 373
» Multiagent learning using a variable learning rate
Sort
View
ISMIS
2005
Springer
15 years 3 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
ASSISTIVE
1998
Springer
15 years 2 months ago
Providing Intelligent Language Feedback for Augmentative Communication Users
People with severe speech and motor impairments SSMI can often use augmentative communication devices to help them communicate. While these devices can provide speech synthesis or ...
Christopher A. Pennington, Kathleen F. McCoy
MEDIAFORENSICS
2010
14 years 8 months ago
Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channels
Error correction codes of suitable redundancy are used for ensuring perfect data recovery in noisy channels. For iterative decoding based methods, the decoder needs to be initiali...
Anindya Sarkar, B. S. Manjunath
AAAI
2010
14 years 11 months ago
Efficient Lifting for Online Probabilistic Inference
Lifting can greatly reduce the cost of inference on firstorder probabilistic graphical models, but constructing the lifted network can itself be quite costly. In online applicatio...
Aniruddh Nath, Pedro Domingos
ICPR
2002
IEEE
15 years 11 months ago
Recognition of Gestures in the Context of Speech
The scope of this paper is the interpretation of a user's intention via a video camera and a speech recognizer. In comparison to previous work which only takes into account g...
Matthieu Bray, Hedvig Sidenbladh, Jan-Olof Eklundh