Sciweavers

2096 search results - page 147 / 420
» Structured Parameter Elicitation
Sort
View
103
Voted
CCS
2003
ACM
15 years 9 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
116
Voted
AAAI
2007
15 years 6 months ago
Manifold Denoising as Preprocessing for Finding Natural Representations of Data
A natural representation of data is given by the parameters which generated the data. If the space of parameters is continuous, then we can regard it as a manifold. In practice, w...
Matthias Hein, Markus Maier
126
Voted
ETFA
2008
IEEE
15 years 5 months ago
Adaptive real-time scheduling for legacy applications
A remarkable research activity has been carried out in the past few years to support real-time applications by means of appropriate scheduling solutions. For scarcely known or hig...
Luca Abeni, Luigi Palopoli
150
Voted
WSC
2001
15 years 5 months ago
On improving the performance of simulation-based algorithms for average reward processes with application to network pricing
We address performance issues associated with simulationbased algorithms for optimizing Markov reward processes. Specifically, we are concerned with algorithms that exploit the re...
Enrique Campos-Náñez, Stephen D. Pat...
145
Voted
SIMPRA
2008
125views more  SIMPRA 2008»
15 years 3 months ago
Identification of Wiener models using optimal local linear models
The Wiener model is a versatile nonlinear block oriented model structure for miscellaneous applications. In this paper a method for identifying the parameters of such a model usin...
Martin Kozek, Sabina Sinanovic