Sciweavers

6833 search results - page 1301 / 1367
» Some two-character sets
Sort
View
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
14 years 11 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
AAAI
2006
14 years 11 months ago
Large Scale Knowledge Base Systems: An Empirical Evaluation Perspective
In this paper, we discuss how our work on evaluating Semantic Web knowledge base systems (KBSs) contributes to address some broader AI problems. First, we show how our approach pr...
Yuanbo Guo, Abir Qasem, Jeff Heflin
AAAI
2006
14 years 11 months ago
A Multi Agent Approach to Vision Based Robot Scavenging
This paper proposes a design for our entry into the 2006 AAAI Scavenger Hunt Competition and Robot Exhibition. We will be entering a scalable two agent system consisting of off-th...
Kamil Wnuk, Brian Fulkerson, Jeremi Sudol
AAAI
2006
14 years 11 months ago
On Multi-Class Cost-Sensitive Learning
Rescaling is possibly the most popular approach to cost-sensitive learning. This approach works by rescaling the classes according to their costs, and it can be realized in differ...
Zhi-Hua Zhou, Xu-Ying Liu
AIM
2006
14 years 11 months ago
Observing the use of BPM tools: A step towards flexibility
: The development of the tools of Business Process Management (BPM) arises from the spread of the notion of process in the management universe. The application of BPM to strategic ...
Joseph Heili, Jean-Mathias Heraud, Laure France
« Prev « First page 1301 / 1367 Last » Next »