Sciweavers

390 search results - page 57 / 78
» An Improved LAZY-AR Approach to Bayesian Network Inference
Sort
View
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
15 years 5 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
CSFW
2007
IEEE
15 years 6 months ago
Probability of Error in Information-Hiding Protocols
Randomized protocols for hiding private information can often be regarded as noisy channels in the informationtheoretic sense, and the inference of the concealed information can b...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
JCS
2008
93views more  JCS 2008»
14 years 11 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
SIGMETRICS
2006
ACM
102views Hardware» more  SIGMETRICS 2006»
15 years 5 months ago
NetQuest: a flexible framework for large-scale network measurement
Abstract—In this paper, we present NetQuest, a flexible framework for large-scale network measurement. We apply Bayesian experimental design to select active measurements that m...
Han Hee Song, Lili Qiu, Yin Zhang
94
Voted
CSB
2003
IEEE
130views Bioinformatics» more  CSB 2003»
15 years 5 months ago
A Computational Approach to Reconstructing Gene Regulatory Networks
Reverse-engineering of gene networks using linear models often results in an underdetermined system because of excessive unknown parameters. In addition, the practical utility of ...
Xutao Deng, Hesham H. Ali