Sciweavers

1414 search results - page 211 / 283
» Combining Intruder Theories
Sort
View
SIGMOD
2010
ACM
224views Database» more  SIGMOD 2010»
14 years 10 months ago
GDR: a system for guided data repair
Improving data quality is a time-consuming, labor-intensive and often domain specific operation. Existing data repair approaches are either fully automated or not efficient in int...
Mohamed Yakout, Ahmed K. Elmagarmid, Jennifer Nevi...
AI
2007
Springer
14 years 10 months ago
Argument based machine learning
We present a novel approach to machine learning, called ABML (argumentation based ML). This approach combines machine learning from examples with concepts from the field of argum...
Martin Mozina, Jure Zabkar, Ivan Bratko
AMCS
2010
146views Mathematics» more  AMCS 2010»
14 years 10 months ago
Sensor network design for the estimation of spatially distributed processes
satisfactory network connectivity have dominated this line of research and abstracted away from the mathematical description of the physical processes underlying the observed pheno...
Dariusz Ucinski, Maciej Patan
CORR
2010
Springer
143views Education» more  CORR 2010»
14 years 10 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin
CORR
2010
Springer
69views Education» more  CORR 2010»
14 years 10 months ago
Epistemic irrelevance in credal nets: the case of imprecise Markov trees
We focus on credal nets, which are graphical models that generalise Bayesian nets to imprecise probability. We replace the notion of strong independence commonly used in credal ne...
Gert de Cooman, Filip Hermans, Alessandro Antonucc...