Sciweavers

1355 search results - page 240 / 271
» Bayesian networks
Sort
View
ACSAC
2006
IEEE
15 years 5 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
AICCSA
2006
IEEE
133views Hardware» more  AICCSA 2006»
15 years 5 months ago
Learning acyclic rules based on Chaining Genetic Programming
Multi-class problem is the class of problems having more than one classes in the data set. Bayesian Network (BN) is a well-known algorithm handling the multi-class problem and is ...
Wing-Ho Shum, Kwong-Sak Leung, Man Leung Wong
ICCV
2005
IEEE
15 years 5 months ago
Visual Speech Recognition with Loosely Synchronized Feature Streams
We present an approach to detecting and recognizing spoken isolated phrases based solely on visual input. We adopt an architecture that first employs discriminative detection of ...
Kate Saenko, Karen Livescu, Michael Siracusa, Kevi...
IDEAL
2005
Springer
15 years 4 months ago
Co-evolutionary Rule-Chaining Genetic Programming
Abstract. A novel Genetic Programming (GP) paradigm called Coevolutionary Rule-Chaining Genetic Programming (CRGP) has been proposed to learn the relationships among attributes rep...
Wing-Ho Shum, Kwong-Sak Leung, Man Leung Wong
MADNES
2005
Springer
15 years 4 months ago
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results
With the rapid advance of the Internet, a large amount of sensitive data is collected, stored, and processed by different parties. Data mining is a powerful tool that can extract ...
Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong