Sciweavers

1512 search results - page 172 / 303
» When Suboptimal Rules
Sort
View
IDEAL
2005
Springer
15 years 4 months ago
SOM-Based Novelty Detection Using Novel Data
Novelty detection involves identifying novel patterns. They are not usually available during training. Even if they are, the data quantity imbalance leads to a low classification ...
Hyoungjoo Lee, Sungzoon Cho
SENSYS
2004
ACM
15 years 4 months ago
Decentralized synchronization protocols with nearest neighbor communication
A class of synchronization protocols for dense, large-scale sensor networks is presented. The protocols build on the recent work of Hong, Cheow, and Scaglione [5, 6] in which the ...
Dennis Lucarelli, I-Jeng Wang
ESORICS
2004
Springer
15 years 4 months ago
Security Property Based Administrative Controls
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with ļ¬...
Jon A. Solworth, Robert H. Sloan
ICBA
2004
Springer
163views Biometrics» more  ICBA 2004»
15 years 4 months ago
Personal Identification and Verification: Fusion of Palmprint Representations
This paper aims to study the accuracy and robustness of personal identification or verification systems where palmprint is the only modality available or utilized. Three different ...
Carmen Poon, David C. M. Wong, Helen C. Shen
JELIA
2004
Springer
15 years 4 months ago
Modelling Communicating Agents in Timed Reasoning Logics
Practical reasoners are resource-bounded—in particular they require time to derive consequences of their knowledge. Building on the Timed Reasoning Logics (TRL) framework introdu...
Natasha Alechina, Brian Logan, Mark Whitsey