Sciweavers

416 search results - page 63 / 84
» Enough of Processes - Lets do Practices
Sort
View
ALT
2000
Springer
15 years 1 months ago
Computationally Efficient Transductive Machines
In this paper1 we propose a new algorithm for providing confidence and credibility values for predictions on a multi-class pattern recognition problem which uses Support Vector mac...
Craig Saunders, Alexander Gammerman, Volodya Vovk
AAAI
2007
14 years 12 months ago
Manifold Denoising as Preprocessing for Finding Natural Representations of Data
A natural representation of data is given by the parameters which generated the data. If the space of parameters is continuous, then we can regard it as a manifold. In practice, w...
Matthias Hein, Markus Maier
FIMI
2003
146views Data Mining» more  FIMI 2003»
14 years 11 months ago
ARMOR: Association Rule Mining based on ORacle
In this paper, we first focus our attention on the question of how much space remains for performance improvement over current association rule mining algorithms. Our strategy is...
Vikram Pudi, Jayant R. Haritsa
TKDE
2002
67views more  TKDE 2002»
14 years 9 months ago
Recovery from Malicious Transactions
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
Paul Ammann, Sushil Jajodia, Peng Liu
INFOCOM
2010
IEEE
14 years 8 months ago
Bargaining and Price-of-Anarchy in Repeated Inter-Session Network Coding Games
— Most of the previous work on network coding has assumed that the users are not selfish and always follow the designed coding schemes. However, recent results have shown that s...
Amir Hamed Mohsenian Rad, Jianwei Huang, Vincent W...