Sciweavers

1512 search results - page 201 / 303
» When Suboptimal Rules
Sort
View
CN
2007
106views more  CN 2007»
14 years 11 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
JAIR
2008
130views more  JAIR 2008»
14 years 11 months ago
Axiomatic Foundations for Ranking Systems
Reasoning about agent preferences on a set of alternatives, and the aggregation of such preferences into some social ranking is a fundamental issue in reasoning about multi-agent ...
Alon Altman, Moshe Tennenholtz
CORR
2007
Springer
93views Education» more  CORR 2007»
14 years 11 months ago
Performance Analysis for Multichannel Reception of OOFSK Signaling
— 1 In this paper, the error performance of onoff frequency shift keying (OOFSK) modulation over fading channels is analyzed when the receiver is equipped with multiple antennas....
Qingyun Wang, Mustafa Cenk Gursoy
73
Voted
AMAI
2002
Springer
14 years 11 months ago
An Empirical Test of Patterns for Nonmonotonic Inference
: It is claimed that human inferential apparatus offers interesting ground in order to consider the intuitions of artificial intelligence researchers about the inference patterns a...
Rui Da Silva Neves, Jean-François Bonnefon,...
ESWA
2002
134views more  ESWA 2002»
14 years 11 months ago
A personalized recommender system based on web usage mining and decision tree induction
A personalized product recommendation is an enabling mechanism to overcome information overload occurred when shopping in an Internet marketplace. Collaborative filtering has been...
Yoon Ho Cho, Jae Kyeong Kim, Soung Hie Kim