Sciweavers

96 search results - page 15 / 20
» expert 1998
Sort
View
71
Voted
AAAI
1998
14 years 11 months ago
Bayesian Network Models for Generation of Crisis Management Training Scenarios
We present a noisy-OR Bayesian network model for simulation-based training, and an efficient search-based algorithm for automatic synthesis of plausible training scenarios from co...
Eugene Grois, William H. Hsu, Mikhail Voloshin, Da...
74
Voted
BILDMED
1998
116views Algorithms» more  BILDMED 1998»
14 years 11 months ago
Computer aided diagnosis of bone lesions in the facial skeleton
We present a system for computer aided diagnosis of bone tumors in the facial skeleton. There are many di erent lesions with radiographic manifestation in the jaws. Our system help...
Wolfgang Sörgel, Sabine Girod, Martin Szummer...
112
Voted
ICISC
1998
132views Cryptology» more  ICISC 1998»
14 years 11 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
NIPS
1998
14 years 11 months ago
SMEM Algorithm for Mixture Models
When learning a mixture model, we suffer from the local optima and model structure determination problems. In this paper, we present a method for simultaneously solving these prob...
Naonori Ueda, Ryohei Nakano, Zoubin Ghahramani, Ge...
87
Voted
PROLAMAT
1998
14 years 11 months ago
Design Knowledge Collection by Modeling
Since design is a process in which designers use various kinds of knowledge and it is an open-ended problem, it is difficult to prepare all necessary knowledge before design. Also...
Masaharu Yoshioka, T. Sekiya, Tetsuo Tomiyama