Sciweavers

1712 search results - page 157 / 343
» A Computational Approach to Binding Theory
Sort
View
ICDM
2003
IEEE
134views Data Mining» more  ICDM 2003»
15 years 7 months ago
Cost-Sensitive Learning by Cost-Proportionate Example Weighting
We propose and evaluate a family of methods for converting classifier learning algorithms and classification theory into cost-sensitive algorithms and theory. The proposed conve...
Bianca Zadrozny, John Langford, Naoki Abe
AGENTS
1997
Springer
15 years 6 months ago
COLLAGEN: When Agents Collaborate with People
We take the position that autonomous agents, when they interact with people, should be governed by the same principles that underlie human collaboration. These principles come fro...
Charles Rich, Candace L. Sidner
117
Voted
EUROCRYPT
2008
Springer
15 years 3 months ago
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
In the model of perfectly secure message transmission schemes (PSMTs), there are n channels between a sender and a receiver. An infinitely powerful adversary A may corrupt (observe...
Kaoru Kurosawa, Kazuhiro Suzuki
143
Voted
COMMA
2006
15 years 3 months ago
Value-Based Argumentation for Democratic Decision Support
In this paper we discuss the integration of two systems that are based on a specific theory of argumentation: the first, an existing web-based discussion forum; the second, a metho...
Katie Atkinson
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
15 years 2 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...