Sciweavers

15073 search results - page 27 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
CCS
2009
ACM
15 years 4 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
100
Voted
HUC
2004
Springer
15 years 3 months ago
Particle Filters for Location Estimation in Ubiquitous Computing: A Case Study
Location estimation is an important part of many ubiquitous computing systems. Particle filters are simulation-based probabilistic approximations which the robotics community has ...
Jeffrey Hightower, Gaetano Borriello
ISMIS
2005
Springer
15 years 3 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
72
Voted
WWW
2002
ACM
15 years 10 months ago
A probabilistic approach to automated bidding in alternative auctions
This paper presents an approach to develop bidding agents that participate in multiple alternative auctions, with the goal of obtaining an item at the lowest price. The approach c...
Marlon Dumas, Lachlan Aldred, Guido Governatori, A...
ICASSP
2008
IEEE
15 years 4 months ago
AN EM-based probabilistic approach for Acoustic Echo Suppression
This paper introduces a new Acoustic Echo Suppression (AES) algorithm for suppressing the residual echo after the Acoustic Echo Canceller (AEC). By temporally segmenting the frequ...
Nilesh Madhu, Ivan Tashev, Alex Acero