Sciweavers

28 search results - page 3 / 6
» Defensive Universal Learning with Experts
Sort
View
KBSE
2007
IEEE
14 years 13 days ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
ETS
2000
IEEE
126views Hardware» more  ETS 2000»
13 years 6 months ago
Dynamic Goal-Based Role-Play Simulation on the Web: A Case Study
This paper outlines and discusses the pedagogical approach, the technical design architecture, and an innovative implementation of a collaborative role-play simulation technology ...
Som Naidu, Albert Ip, Roni Linser
CVPR
2009
IEEE
1081views Computer Vision» more  CVPR 2009»
15 years 1 months ago
Learning Real-Time MRF Inference for Image Denoising
Many computer vision problems can be formulated in a Bayesian framework with Markov Random Field (MRF) or Conditional Random Field (CRF) priors. Usually, the model assumes that ...
Adrian Barbu (Florida State University)
NIPS
2003
13 years 7 months ago
Can We Learn to Beat the Best Stock
A novel algorithm for actively trading stocks is presented. While traditional universal algorithms (and technical trading heuristics) attempt to predict winners or trends, our app...
Allan Borodin, Ran El-Yaniv, Vincent Gogan
IJCNN
2008
IEEE
14 years 17 days ago
Building meta-learning algorithms basing on search controlled by machine complexity
Abstract— Meta-learning helps us find solutions to computational intelligence (CI) challenges in automated way. Metalearning algorithm presented in this paper is universal and m...
Norbert Jankowski, Krzysztof Grabczewski