Sciweavers

2905 search results - page 442 / 581
» Formal Memetic Algorithms
Sort
View
112
Voted
CCS
2009
ACM
15 years 10 months ago
A framework for quantitative security analysis of machine learning
We propose a framework for quantitative security analysis of machine learning methods. Key issus of this framework are a formal specification of the deployed learning model and a...
Pavel Laskov, Marius Kloft
118
Voted
FOSSACS
2009
Springer
15 years 10 months ago
Synthesis from Component Libraries
Abstract. Synthesis is the automatic construction of a system from its specification. In the classical synthesis algorithms it is always assumed the system is “constructed from ...
Yoad Lustig, Moshe Y. Vardi
100
Voted
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
15 years 10 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia
ICDM
2009
IEEE
110views Data Mining» more  ICDM 2009»
15 years 10 months ago
Projective Clustering Ensembles
Recent advances in data clustering concern clustering ensembles and projective clustering methods, each addressing different issues in clustering problems. In this paper, we consi...
Francesco Gullo, Carlotta Domeniconi, Andrea Tagar...
158
Voted
AI
2009
Springer
15 years 10 months ago
An Ontology-Based Spatial Clustering Selection System
Spatial clustering, which groups similar spatial objects into classes, is an important research topic in spatial data mining. Many spatial clustering methods have been developed re...
Wei Gu, Xin Wang, Danielle Ziébelin