Sciweavers

6960 search results - page 236 / 1392
» Continuity Analysis of Programs
Sort
View
117
Voted
ICDM
2007
IEEE
158views Data Mining» more  ICDM 2007»
15 years 10 months ago
On Appropriate Assumptions to Mine Data Streams: Analysis and Practice
Recent years have witnessed an increasing number of studies in stream mining, which aim at building an accurate model for continuously arriving data. Somehow most existing work ma...
Jing Gao, Wei Fan, Jiawei Han
109
Voted
ATAL
2005
Springer
15 years 9 months ago
Multi-agent reward analysis for learning in noisy domains
In many multi agent learning problems, it is difficult to determine, a priori, the agent reward structure that will lead to good performance. This problem is particularly pronoun...
Adrian K. Agogino, Kagan Tumer
116
Voted
NDSS
2002
IEEE
15 years 8 months ago
An Analysis of the Degradation of Anonymous Protocols
There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of eac...
Matthew Wright, Micah Adler, Brian Neil Levine, Cl...
114
Voted
CCS
2010
ACM
15 years 3 months ago
The security of modern password expiration: an algorithmic framework and empirical analysis
This paper presents the first large-scale study of the success of password expiration in meeting its intended purpose, namely revoking access to an account by an attacker who has ...
Yinqian Zhang, Fabian Monrose, Michael K. Reiter
133
Voted
AIR
1998
103views more  AIR 1998»
15 years 3 months ago
Tackling Real-Coded Genetic Algorithms: Operators and Tools for Behavioural Analysis
Abstract. Genetic algorithms play a significant role, as search techniques for handling complex spaces, in many fields such as artificial intelligence, engineering, robotic, etc...
Francisco Herrera, Manuel Lozano, José L. V...