Sciweavers

988 search results - page 90 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
JMLR
2006
112views more  JMLR 2006»
14 years 9 months ago
Kernels on Prolog Proof Trees: Statistical Learning in the ILP Setting
We develop kernels for measuring the similarity between relational instances using background knowledge expressed in first-order logic. The method allows us to bridge the gap betw...
Andrea Passerini, Paolo Frasconi, Luc De Raedt
CCR
2002
85views more  CCR 2002»
14 years 9 months ago
The influence of ATM on operating systems
The features of ATM offered many attractions to the application community, such as fine-grained multiplexing and high-throughput links. These created considerable challenges for t...
Jonathan M. Smith
ISI
2008
Springer
14 years 8 months ago
Anomaly detection in high-dimensional network data streams: A case study
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Ji Zhang, Qigang Gao, Hai H. Wang
CDC
2009
IEEE
147views Control Systems» more  CDC 2009»
14 years 7 months ago
The asymmetric sinistral/dextral Markov-Dubins problem
Abstract-- We consider a variation of the classical MarkovDubins problem dealing with curvature-constrained, shortest paths in the plane with prescribed initial and terminal positi...
Efstathios Bakolas, Panagiotis Tsiotras
DRR
2009
14 years 7 months ago
Mark Detection from Scanned Ballots
Analyzing paper-based election ballots requires finding all marks added to the base ballot. The position, size, shape, rotation and shade of these marks are not known a priori. Sc...
Elisa H. Barney Smith, George Nagy, Daniel P. Lopr...