Sciweavers

632 search results - page 126 / 127
» Visualization Techniques for the Evaluation of Knowledge Sys...
Sort
View
ESORICS
2004
Springer
13 years 11 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
ATAL
2006
Springer
13 years 10 months ago
Robust recognition of physical team behaviors using spatio-temporal models
This paper presents a framework for robustly recognizing physical team behaviors by exploiting spatio-temporal patterns. Agent team behaviors in athletic and military domains typi...
Gita Sukthankar, Katia P. Sycara
BMCBI
2010
178views more  BMCBI 2010»
13 years 6 months ago
An improved method for scoring protein-protein interactions using semantic similarity within the Gene Ontology
Background: Semantic similarity measures are useful to assess the physiological relevance of protein-protein interactions (PPIs). They quantify similarity between proteins based o...
Shobhit Jain, Gary D. Bader
JMLR
2006
124views more  JMLR 2006»
13 years 6 months ago
Policy Gradient in Continuous Time
Policy search is a method for approximately solving an optimal control problem by performing a parametric optimization search in a given class of parameterized policies. In order ...
Rémi Munos
TMI
2002
96views more  TMI 2002»
13 years 5 months ago
Imaging of spatiotemporal coincident states by DC optical tomography
The utility of optical tomography as a practical imaging modality has, thus far, been limited by its intrinsically low spatial resolution and quantitative accuracy. Recently, we ha...
Harry L. Graber, Yaling Pei, Randall L. Barbour