Sciweavers

2025 search results - page 2 / 405
» On the Utility of Inference Mechanisms
Sort
View
ISI
2006
Springer
13 years 4 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
AAAI
2010
13 years 6 months ago
Efficient Belief Propagation for Utility Maximization and Repeated Inference
Many problems require repeated inference on probabilistic graphical models, with different values for evidence variables or other changes. Examples of such problems include utilit...
Aniruddh Nath, Pedro Domingos
APSCC
2010
IEEE
13 years 2 months ago
Service-centric Inference and Utilization of Confidence on Context
Abstract--The inadequate quality of context forces the context consumers in pervasive environments to reason about the quality and relevance of context to be confident of its worth...
Atif Manzoor, Hong Linh Truong, Christoph Dorn, Sc...