Sciweavers

7544 search results - page 1367 / 1509
» Network Forensics Analysis
Sort
View
DAWAK
2006
Springer
15 years 8 months ago
Learning Classifiers from Distributed, Ontology-Extended Data Sources
Abstract. There is an urgent need for sound approaches to integrative and collaborative analysis of large, autonomous (and hence, inevitably semantically heterogeneous) data source...
Doina Caragea, Jun Zhang 0002, Jyotishman Pathak, ...
EUROPKI
2006
Springer
15 years 8 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
GECCO
2006
Springer
208views Optimization» more  GECCO 2006»
15 years 8 months ago
Comparing evolutionary and temporal difference methods in a reinforcement learning domain
Both genetic algorithms (GAs) and temporal difference (TD) methods have proven effective at solving reinforcement learning (RL) problems. However, since few rigorous empirical com...
Matthew E. Taylor, Shimon Whiteson, Peter Stone
FGR
2000
IEEE
141views Biometrics» more  FGR 2000»
15 years 8 months ago
Memory-Based Face Recognition for Visitor Identification
We show that a simple, memory-based technique for appearance-based face recognition, motivated by the realworld task of visitor identification, can outperform more sophisticated a...
Terence Sim, Rahul Sukthankar, Matthew D. Mullin, ...
FOSAD
2000
Springer
15 years 8 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
« Prev « First page 1367 / 1509 Last » Next »