Now showing items 1079-1098 of 2591

• #### KnowSmart ﻿

KnowSmart is our team's innovative approach towards implementing smart house technology that is quickly emerging on today's market. Management of the home is done by a central command server. Multiple modules on devices ...
• #### KOI-3158: The oldest known system of terrestrial-size planets ﻿

(2015-09-23)
The first discoveries of exoplanets around Sun-like stars have fueled efforts to find ever smaller worlds evocative of Earth and other terrestrial planets in the Solar System. While gas-giant planets appear to form ...
• #### KOI-3158: The oldest known system of terrestrial-size planets ﻿

(2015-09-23)
The first discoveries of exoplanets around Sun-like stars have fueled efforts to find ever smaller worlds evocative of Earth and other terrestrial planets in the Solar System. While gas-giant planets appear to form ...
• #### The Kolmogorov equation with time-measurable coefficients ﻿

(2003-07-13)
Using both probabilistic and classical analytic techniques, we investigate the parabolic Kolmogorov equation  L_t v +\frac {\partial v}{\partial t}\equiv \frac 12 a^{ij}(t)v_{x^ix^j} +b^i(t) v_{x^i} -c(t) v+ f(t) ...
• #### Lactose variability of Escherichia coli in thermally stressed reactor effluent waters ﻿

(1978)
Lactose-utilizing and nalidixic acid-resistant populations of Escherichia coli, having an optimum growth temperature of 37°C, were placed in modified diffusion chambers. The chambers were submerged in the epilimnion and ...
• #### Lajos Takács and his work ﻿

(1994-10-01)
This paper, written in honor of the 70th birthday of Lajos Takács, addresses his life and work, and includes some personal observations and appreciation of his contributions. In particular, it includes a short biography, ...
• #### Language Relations on Twitter: A Network Science Approach ﻿

(2017-04)
Online social networks (e.g., Twitter and Facebook) play a vital role in the spreading of information in today’s world. Interestingly, the spread of information is enabled by the existence of an underlying connectivity ...
• #### Late Holocene Climate and Vegetation Change in Central Michigan ﻿

(2017-05)
Understanding the effects of drought and temperature change on eastern North America will be key in the context of future climate change. Perhaps the best method to understand how drought and temperature will impact this ...
• #### Layered analytical radiative transfer model for simulating water color of coastal waters and algorithm development ﻿

(2000-12-22)
A remote sensing reflectance model, which describes the transfer of irradiant light within a homogeneous water column has previously been used to simulate the nadir viewing reflectance just above or below the water surface ...
• #### Layered unequal loss protection for image transmission over packet loss channels with delay constraints ﻿

(2004-10-25)
In the case of high bit rate image transmission or having lots of packets, the FEC (forward error correction) encoding and decoding processes in the ULP (unequal loss protection) based schemes should be applied to individual ...
• #### Layered unequal loss protection for progressive image transmission over packet loss channels ﻿

(2004-01-18)
In the past, many schemes have been proposed for progressive image transmission using unequal error protection (UEP) or unequal loss protection (ULP). However, most existing UEP/ULP schemes do not consider the minimum image ...
• #### Leader Emotion Management Behavior and Perceived Leader Effectiveness: The Moderating Roles of Gender and Culture ﻿

(2016-12)
A key aspect of successful management includes a leader’s responsibility to manage employees’ emotions (Leavitt & Bahrami, 1988). This form of management can be reflected in a number of behaviors, such as demonstrating ...
• #### Learning implicit user interest hierarchy for context in personalization ﻿

(2002-10-05)
To provide a more robust context for personalization, we desire to extract a continuum of general (long-term) to specific (short-term) interests of a user. Our proposed approach is to learn a user interest hierarchy (UIH) ...
• #### Learning implicit user interest hierarchy for web personalization ﻿

(2005-04-19)
Most web search engines are designed to serve all users in a general way, without considering the interests of individual users. In contrast, personalized web search engines incorporate an individual user's interests when ...
• #### Learning models of network traffic for detecting novel attacks ﻿

(2002-05-24)
Network intrusion detection systems often rely on matching patterns that are gleaned from known attacks. While this method is reliable and rarely produces false alarms, it has the obvious disadvantage that it cannot detect ...
• #### Learning nonstationary models of normal network traffic for detecting novel attacks ﻿

(2002-04-29)
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new attacks which do not have known signatures. In ...
• #### Learning rules for anomaly detection of hostile network traffic ﻿

(2003-06-10)
We introduce an algorithm called LERAD that learns rules for finding rare events in nominal time-series data with long range dependencies. We use LERAD to find anomalies in network packets and TCP sessions to detect novel ...
• #### Learning rules for time series anomaly detection ﻿

(2005-02-17)
We describe a multi-dimensional time series anomaly detection method in which each point in a test series is required to match the value, slope, and curvature of a point seen in training (with an optional sequential ...
• #### Learning rules from system call arguments and sequences for anomaly detection ﻿

(2003-06-11)
Many approaches have been suggested and various systems have been modeled to detect intrusions from anomalous behavior of systems calls as a result of an attack. Though these techniques have been shown to be quite effective, ...
• #### Learning states and rules for time series anomaly detection ﻿

(2003-03-09)
In this paper, we investigate machine learning techniques for discovering knowledge that can be used to monitor the operation of devices or systems. Specifically, we study methods for generating models that can detect ...