Sciweavers

2006 search results - page 392 / 402
» Heuristic Security-Testing Methods
Sort
View
86
Voted
LREC
2010
198views Education» more  LREC 2010»
15 years 1 months ago
The Cambridge Cookie-Theft Corpus: A Corpus of Directed and Spontaneous Speech of Brain-Damaged Patients and Healthy Individuals
Investigating differences in linguistic usage between individuals who have suffered brain injury (hereafter patients) and those who haven't can yield a number of benefits. It...
Caroline Williams, Andrew Thwaites, Paula Buttery,...
DMIN
2008
190views Data Mining» more  DMIN 2008»
15 years 1 months ago
Optimization of Self-Organizing Maps Ensemble in Prediction
The knowledge discovery process encounters the difficulties to analyze large amount of data. Indeed, some theoretical problems related to high dimensional spaces then appear and de...
Elie Prudhomme, Stéphane Lallich
NIPS
2008
15 years 1 months ago
Optimization on a Budget: A Reinforcement Learning Approach
Many popular optimization algorithms, like the Levenberg-Marquardt algorithm (LMA), use heuristic-based "controllers" that modulate the behavior of the optimizer during ...
Paul Ruvolo, Ian R. Fasel, Javier R. Movellan
126
Voted
SDM
2007
SIAM
187views Data Mining» more  SDM 2007»
15 years 1 months ago
Topic Models over Text Streams: A Study of Batch and Online Unsupervised Learning
Topic modeling techniques have widespread use in text data mining applications. Some applications use batch models, which perform clustering on the document collection in aggregat...
Arindam Banerjee, Sugato Basu
106
Voted
CSREASAM
2006
15 years 1 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin