Sciweavers

2338 search results - page 374 / 468
» Separation in Theory - Coordination in Practice
Sort
View
VIROLOGY
2008
121views more  VIROLOGY 2008»
14 years 10 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
99
Voted
KAIS
2007
120views more  KAIS 2007»
14 years 10 months ago
Capabilities of outlier detection schemes in large datasets, framework and methodologies
Abstract. Outlier detection is concerned with discovering exceptional behaviors of objects. Its theoretical principle and practical implementation lay a foundation for some importa...
Jian Tang, Zhixiang Chen, Ada Wai-Chee Fu, David W...
AI
2002
Springer
14 years 10 months ago
Learning Bayesian networks from data: An information-theory based approach
This paper provides algorithms that use an information-theoretic analysis to learn Bayesian network structures from data. Based on our three-phase learning framework, we develop e...
Jie Cheng, Russell Greiner, Jonathan Kelly, David ...
93
Voted
CCE
2004
14 years 10 months ago
Stochastic maximum principle for optimal control under uncertainty
Optimal control problems involve the difficult task of determining time-varying profiles through dynamic optimization. Such problems become even more complex in practical situatio...
Vicente Rico-Ramírez, Urmila M. Diwekar
AI
2000
Springer
14 years 10 months ago
On agent-based software engineering
Agent-based computing represents an exciting new synthesis both for Artificial Intelligence (AI) and, more generally, Computer Science. It has the potential to significantly impro...
Nicholas R. Jennings