Sciweavers

1669 search results - page 1 / 334
» SMO-Style Algorithms for Learning Using Privileged Informati...
Sort
View
DMIN
2010
262views Data Mining» more  DMIN 2010»
13 years 2 months ago
SMO-Style Algorithms for Learning Using Privileged Information
Recently Vapnik et al. [11, 12, 13] introduced a new learning model, called Learning Using Privileged Information (LUPI). In this model, along with standard training data, the tea...
Dmitry Pechyony, Rauf Izmailov, Akshay Vashist, Vl...
RAID
2000
Springer
13 years 8 months ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
CRV
2006
IEEE
128views Robotics» more  CRV 2006»
13 years 8 months ago
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption
Conventional image-oriented cryptographic techniques lack the flexibility needed for content-specific security features such as the concealment of confidential information within ...
Alexander Wong, William Bishop
SIGMOD
2004
ACM
170views Database» more  SIGMOD 2004»
14 years 5 months ago
A Formal Analysis of Information Disclosure in Data Exchange
We perform a theoretical study of the following queryview security problem: given a view V to be published, does V logically disclose information about a confidential query S? The...
Gerome Miklau, Dan Suciu
CICLING
2004
Springer
13 years 8 months ago
Korean Compound Noun Decomposition Using Syllabic Information Only
The compound nouns are freely composed in Korean, since it is possible to concatenate independent nouns without a postposition. Therefore, the systems that handle compound nouns su...
Seong-Bae Park, Jeong Ho Chang, Byoung-Tak Zhang