26 Hits in 7.1 sec


Yang Xiang, David Poole, Michael P. Beddoes
1993 Computational intelligence  
The most notable is the hypertree agent organization which prevents an agent from communicating directly with arbitrarily another agent.  ...  Multiply sectioned Bayesian networks (MSBNs) provide an effective and exact framework for such a task but also impose a set of constraints.  ...  Then a junction tree organization of agents must be used.  ... 
doi:10.1111/j.1467-8640.1993.tb00306.x fatcat:bpiadlsqbnfvbcbvakdfoj7r5m

PAID: A Probabilistic Agent-Based Intrusion Detection system

Vaibhav Gowadia, Csilla Farkas, Marco Valtorta
2005 Computers & security  
Agents are capable to perform soft-evidential update, thus providing a continuous scale for intrusion detection. We propose methods for modelling errors and resolving conflicts among beliefs.  ...  The main contributions of our work are the following: our model allows agents to share their beliefs, i.e., the probability distribution of an event occurrence.  ...  Any opinions, findings, conclusions, or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the U.S. Government.  ... 
doi:10.1016/j.cose.2005.06.008 fatcat:nrjvtfijd5ezdggdw556jbtqfu

An Introduction to Sensor Data Analytics [chapter]

Charu C. Aggarwal
2012 Managing and Mining Sensor Data  
In addition, such data is often sensitive, and brings a number of privacy challenges associated with it.  ...  We will also present the organization of the chapters in this book in this context. Sensors are often designed for applications which require real-time processing.  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.  ... 
doi:10.1007/978-1-4614-6309-2_1 fatcat:pfbx566yfzgqpnjcuzonmxr23q

Justifying multiply sectioned Bayesian networks

Y. Xiang, V. Lesser
Proceedings Fourth International Conference on MultiAgent Systems  
The most notable is the hypertree agent organization which prevents an agent from communicating with arbitrarily another agent.  ...  Multiply sectioned Bayesian networks (MSBNs) provide an e ective and exact framework for such a task but also impose a set of constraints.  ...  Then a junction tree organization of agents must be used.  ... 
doi:10.1109/icmas.2000.858473 dblp:conf/icmas/XiangL00 fatcat:mjpwvd64xrbpdlfgjl7aokyv5e

Synthetic Data for Deep Learning [article]

Sergey I. Nikolenko
2019 arXiv   pre-print
Third, we turn to privacy-related applications of synthetic data and review the work on generating synthetic datasets with differential privacy guarantees.  ...  Synthetic data is an increasingly popular tool for training deep learning models, especially in computer vision but also in other areas.  ...  [531] , VAE, AAE, and Junction Tree VAE [283] , together with a variety of evaluation metrics for generation results.  ... 
arXiv:1909.11512v1 fatcat:qquxnw4dfvgmfeztbpdqhr44gy

Explainable AI for B5G/6G: Technical Aspects, Use Cases, and Research Challenges [article]

Shen Wang, M.Atif Qureshi, Luis Miralles-Pechuaán, Thien Huynh-The, Thippa Reddy Gadekallu, Madhusanka Liyanage
2021 arXiv   pre-print
These decisions can range widely, from network resource allocation to collision avoidance for self-driving cars.  ...  Such a 6G network will lead to an excessive number of automated decisions made every second.  ...  For example, a multi-agent Q-learning algorithm channel access, power allocation and interference manage- and a decision tree classification model were studied to tackle ment, user association  ... 
arXiv:2112.04698v1 fatcat:y7ss4opmrjbsbjm3ip2vgkkgky

Applications of Deep Learning and Reinforcement Learning to Biological Data

Mufti Mahmud, Mohammed Shamim Kaiser, Amir Hussain, Stefano Vassanelli
2018 IEEE Transactions on Neural Networks and Learning Systems  
, Medical Imaging, and [Brain/Body]-Machine Interfaces), thus generating novel opportunities for development of dedicated data intensive machine learning techniques.  ...  Rapid advances of hardware-based technologies during the past decades have opened up new possibilities for Life scientists to gather multimodal data in various application domains (e.g., Omics, Bioimaging  ...  Kamal Abu-Hassan for useful discussions during the early stage of the work. This work was supported by the ACSLab (  ... 
doi:10.1109/tnnls.2018.2790388 pmid:29771663 fatcat:6r63zihrfvea7cto4ei3mlvqtu

Statistical shape modeling in virtual assembly using PCA-technique

Björn Lindau, Lars Lindkvist, Alf Andersson, Rikard Söderberg
2013 Journal of manufacturing systems  
A special thanks to Samuel Lorin PPU at Chalmers and Carl Angervall at VCC for constructive discussions on the subject.  ...  This work has been funded by Vinnova within the program Production Strategies and Models for Product Realization.  ...  Moreover, a junction tree is established for each d-sepset between two sub-graphs, these junction trees are known as linkage trees.  ... 
doi:10.1016/j.jmsy.2013.02.002 fatcat:eaucg4ewmre3lefsbiihax6tza

Intrusion-Detection Systems [chapter]

Peng Ning, Sushil Jajodia
2012 Handbook of Computer Networks  
and software assurance. of maturity to warrant a comprehensive textbook treatment. ideas for books under this series.  ...  Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source  ...  Acknowledgment This work has been partially funded by the Ministero dell'Università e della Ricerca (MiUR) in the framework of the RECIPE Project, and by the EU as part of the IST Programme -within the  ... 
doi:10.1002/9781118256107.ch26 fatcat:aeidzkegvfc27dqqmztiayv3dm

International review panel

2011 2011 6th International Conference on Industrial and Information Systems  
Acknowledgements I would like to thank Alan Penn for spatially related advice, and Peter Bentley for insights while developing the model presented in this paper.  ...  Acknowledgements I'd like to thank the reviewers for constructive comments that helped to make the point in this article clearer.  ...  (2002) developed a multi-agent system as the core of a 3D multi-user virtual world. Each object in the world is an agent in a multiagent system.  ... 
doi:10.1109/iciinfs.2011.6038027 fatcat:olgp74wayzadfb7n7f7mtx2jyi

A Vademecum on Blockchain Technologies: When, Which and How

Marianna Belotti, Nikola Bozic, Guy Pujolle, Stefano Secci
2019 IEEE Communications Surveys and Tutorials  
for a vademecum guiding designers toward the right decision about when to adopt blockchain or not, which kind of blockchain better meets use-case requirements, and how to use it.  ...  Blockchain is a technology making the shared registry concept from distributed systems a reality for a number of application domains, from the cryptocurrency one to potentially any industrial system requiring  ...  ACKNOWLEDGMENT The authors would like to thank Eric Gressier-Soudan for his valuable feedback on the article as well the anonymous Reviewers for the constructive comments that significantly improved the  ... 
doi:10.1109/comst.2019.2928178 fatcat:isvs2zswl5hzfady4pjv63bkqq

Paradigms for Algorithms and Interactions [chapter]

Andrea Zanella, Michele Zorzi, Elena Fasolo, Anibal Ollero, Ivan Maza, Antidio Viguria, Marcelo Pias, George Coulouri, Chiara Petrioli
2010 Cooperating Embedded Systems and Wireless Sensor Networks  
Embedded WiSeNts Paradigms for algorithms and interactions  ...  The aim of the study is to identify the areas that need further research and the most promising design approaches in the context of CObased systems.  ...  Existing data processing techniques based on the construction of some aggregation tree are less scalable than the multipath schemes due to the high cost to maintain the organization of the network.  ... 
doi:10.1002/9780470610817.ch3 fatcat:y6rg4ciutvelxkwt72fhwzdyd4

COGNITIVE 2013 The Fifth International Conference on Advanced Cognitive Technologies and Applications COGNITIVE 2013 Editors

Valencia, Spain, Shunji Shimizu, Hermann Kaindl, Po-Hsun Cheng, Narayanan Kulathuramaiyer, Malaysia Jose, Alfredo Costa, Hermann Kaindl, Po-Hsun Cheng, Narayanan Kulathuramaiyer, Malaysia Jose (+79 others)
Foreword The Fifth International Conference on Advanced Cognitive Technologies and Applications (COGNITIVE 2013   unpublished
targeted advanced concepts, solutions and applications of artificial intelligence, knowledge processing, agents, as key-players, and autonomy as manifestation of self-organized entities and systems.  ...  We are grateful to the members of the COGNITIVE 2013 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.  ...  of Aged Person and Establishment System for Evaluation.  ... 

Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in Multiply Sectioned Bayesian Networks

Dan Wu, Sonia Bhatti
2016 Computer Science & Information Technology ( CS & IT )   unpublished
A linkage tree is nothing but it is a special name given to the junction tree constructed from a d-sepset.  ...  Linked 39 Figure 2 . 5 : 3925 Junction Tree Forest (LJF). As discussed in the previous section the LJF consist of local junction tree each of which is constructed from an MSBN subnet.  ... 
doi:10.5121/csit.2016.60606 fatcat:fjdu6pvdtbbgxenxtsrj5a2ody

Trauma Association of Canada Abstracts 2017

2017 Canadian journal of surgery  
a 1-year period (Mar. 1, 2015, to Mar. 1, 2016) for the nonoperative or operative management of SBO.  ...  Emergency general surgery conditions are often thought of as being too acute and unpredictable for the development of standardized approaches to quality improvement (QI).  ...  Remote ischemic conditioning (RIC) is a noninvasive intervention comprising transient limb ischemia reperfusion that mitigates distant organ injury and inflammation in animal models of ischemia reperfusion  ... 
doi:10.1503/cjs.005617 fatcat:th6qr2nyvngnjokgkce53mncc4
« Previous Showing results 1 — 15 out of 26 results