Sciweavers

1436 search results - page 236 / 288
» Using Machine Learning Techniques to Interpret WH-questions
Sort
View
INFOCOM
2009
IEEE
15 years 8 months ago
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks
—Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that use resources in a proper, disciplined manner...
Song Liu, Yingying Chen, Wade Trappe, Larry J. Gre...
ISPASS
2006
IEEE
15 years 7 months ago
Comparing multinomial and k-means clustering for SimPoint
SimPoint is a technique used to pick what parts of the program’s execution to simulate in order to have a complete picture of execution. SimPoint uses data clustering algorithms...
Greg Hamerly, Erez Perelman, Brad Calder
ITS
2004
Springer
95views Multimedia» more  ITS 2004»
15 years 6 months ago
The Role of Domain Ontology in Knowledge Acquisition for ITSs
Abstract. There have been several attempts to automate knowledge acquisition for ITSs that teach procedural tasks. The goal of our project is to automate the acquisition of domain ...
Pramuditha Suraweera, Antonija Mitrovic, Brent Mar...
ATAL
2011
Springer
14 years 1 months ago
Online anomaly detection in unmanned vehicles
Autonomy requires robustness. The use of unmanned (autonomous) vehicles is appealing for tasks which are dangerous or dull. However, increased reliance on autonomous robots increa...
Eliahu Khalastchi, Gal A. Kaminka, Meir Kalech, Ra...
GECCO
2008
Springer
177views Optimization» more  GECCO 2008»
15 years 2 months ago
Reduced computation for evolutionary optimization in noisy environment
Evolutionary Algorithms’ (EAs’) application to real world optimization problems often involves expensive fitness function evaluation. Naturally this has a crippling effect on ...
Maumita Bhattacharya