Sciweavers

1486 search results - page 80 / 298
» Firewall Rules Analysis
Sort
View
NIPS
2004
15 years 1 months ago
Analysis of a greedy active learning strategy
act out the core search problem of active learning schemes, to better understand the extent to which adaptive labeling can improve sample complexity. We give various upper and low...
Sanjoy Dasgupta
BMCBI
2008
144views more  BMCBI 2008»
15 years 3 hour ago
Rule-based knowledge aggregation for large-scale protein sequence analysis of influenza A viruses
Background: The explosive growth of biological data provides opportunities for new statistical and comparative analyses of large information sets, such as alignments comprising te...
Olivo Miotto, Tin Wee Tan, Vladimir Brusic
SIGMOD
2010
ACM
176views Database» more  SIGMOD 2010»
15 years 4 months ago
DCUBE: discrimination discovery in databases
Discrimination discovery in databases consists in finding unfair practices against minorities which are hidden in a dataset of historical decisions. The DCUBE system implements t...
Salvatore Ruggieri, Dino Pedreschi, Franco Turini
CORR
2011
Springer
150views Education» more  CORR 2011»
14 years 6 months ago
Program Optimization Based Pointer Analysis and Live Stack-Heap Analysis
In this paper, we present type systems for flow-sensitive pointer analysis, live stack-heap (variables) analysis, and program optimization. The type system for live stack-heap ana...
Mohamed A. El-Zawawy
ATAL
2007
Springer
15 years 6 months ago
Average-case tractability of manipulation in voting via the fraction of manipulators
Recent results have established that a variety of voting rules are computationally hard to manipulate in the worst-case; this arguably provides some guarantee of resistance to man...
Ariel D. Procaccia, Jeffrey S. Rosenschein