Search
Skip to Search Results- 121st Century
- 1Anomaly detection
- 1Articles
- 1Artificial learning
- 1Automatic code generation
- 1Carbon credit
- 3Mathematical and Statistical Sciences, Department of
- 3Mathematical and Statistical Sciences, Department of/Research Publications (Mathematical and Statistical Sciences)
- 2Educational Psychology, Department of
- 2Educational Psychology, Department of/Journal Articles (Educational Psychology)
- 1Canadian Circumpolar Institute
- 1Canadian Circumpolar Institute/Circumpolar Collection
-
2004
Chan, C., Cutumisu, M., Szafron, D., Lu, P.
Java has multiple inheritance of interfaces, but only single inheritance of code via classes. This situation results in duplicated code in Java library classes and application code. We describe a generalization to the Java language syntax and the Java Virtual Machine (JVM) to support multiple...
-
Exploring Diversified Strategies for Co-operative Management of Forests by a First Nation and the Province of Alberta
Download2004-12-05
While the boreal forests in northern Alberta have rich natural resources, which assure economic development for regional and provincial finances, for Aboriginal people living there, the forests have played a pivotal role in continuing their traditional subsistence based on hunting and gathering....
-
2004
Considerable effort has been invested by practitioners in many parts of the world in defining information literacy. Much of this work has taken place in the academic environment. What is the relationship between information literacy as we define it in higher education and information literacy...
-
2004
McCrosky, Jesse, Kouritzin, Michael, Blount, Douglas
A hybrid weighted/interacting particle filter, the selectively resampling particle (SERP) filter, is used to detect and track an unknown number of independent targets on a one-dimensional \"racetrack\" domain. The targets evolve in a nonlinear manner. The observations model a sensor positioned...
-
2004
Redford, J., McNaughton, M., Cutumisu, M., Schaeffer, J., Szafron, D., Parker, D.
The state-of-the-art in game scripting is to manually script individual game objects that interact in the game. Thousands of non-player characters (NPCs) and props need to be scripted before they play a part in a game adventure. This situation introduces serious concerns about programming effort...
-
2004
Zhao, Xingqiu, Long, Hongwei, McCrosky, Jesse, Kim, Surrey, Kouritzin, Michael
In this paper, we discuss multi-target tracking for a submarine model based on incomplete observations. The submarine model is a weakly interacting stochastic dynamic system with several submarines in the underlying region. Observations are obtained at discrete times from a number of sonobuoys...
-
2004
Kouritzin, Michael, Kim, Surrey, Sun, Wei, Kim, Hyukjoon
In this note, we consider the problem of detecting network portscans through the use of anomaly detection. First, we introduce some static tests for analyzing traffic rates. Then, we make use of two dynamic chi-square tests to detect anomalous packets. Further, we model network traffic as a...