Sciweavers

797 search results - page 60 / 160
» Observing Success in the Pi-Calculus
Sort
View
CIKM
2001
Springer
15 years 2 months ago
Keeping Found Things Found on the Web
This paper describes the results of an observational study into the methods people use to manage web information for re-use. People observed in our study used a diversity of metho...
William P. Jones, Harry Bruce, Susan T. Dumais
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 1 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
NIPS
2000
14 years 11 months ago
One Microphone Source Separation
Source separation, or computational auditory scene analysis, attempts to extract individual acoustic objects from input which contains a mixture of sounds from different sources, ...
Sam T. Roweis
ATAL
2010
Springer
14 years 11 months ago
Closing the learning-planning loop with predictive state representations
A central problem in artificial intelligence is to choose actions to maximize reward in a partially observable, uncertain environment. To do so, we must learn an accurate model of ...
Byron Boots, Sajid M. Siddiqi, Geoffrey J. Gordon
ICML
2006
IEEE
15 years 10 months ago
Learning to impersonate
Consider Alice, who is interacting with Bob. Alice and Bob have some shared secret which helps Alice identify Bob-impersonators. Now consider Eve, who knows Alice and Bob, but doe...
Moni Naor, Guy N. Rothblum