Sciweavers

6412 search results - page 1101 / 1283
» Human Active Learning
Sort
View
154
Voted
PAKDD
2004
ACM
127views Data Mining» more  PAKDD 2004»
15 years 10 months ago
Exploiting Recurring Usage Patterns to Enhance Filesystem and Memory Subsystem Performance
In many cases, normal uses of a system form patterns that will repeat. The most common patterns can be collected into a prediction model which will essentially predict that usage p...
Benjamin Rutt, Srinivasan Parthasarathy
139
Voted
PPSN
2004
Springer
15 years 10 months ago
Credit Assignment Among Neurons in Co-evolving Populations
Different credit assignment strategies are investigated in a two level co-evolutionary model which involves a population of Gaussian neurons and a population of radial basis funct...
Vineet R. Khare, Xin Yao, Bernhard Sendhoff
127
Voted
ACSAC
2003
IEEE
15 years 10 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
AMFG
2003
IEEE
244views Biometrics» more  AMFG 2003»
15 years 10 months ago
Manifold of Facial Expression
In this paper, we propose the concept of Manifold of Facial Expression based on the observation that images of a subject’s facial expressions define a smooth manifold in the hig...
Ya Chang, Changbo Hu, Matthew Turk
APWEB
2003
Springer
15 years 10 months ago
Extending a Web Browser with Client-Side Mining
Abstract. We present WBext (Web Browser extended), a web browser extended with client-side mining capabilities. WBext learns sophisticated user interests and browsing habits by tai...
Hongjun Lu, Qiong Luo, Yeuk Kiu Shun
« Prev « First page 1101 / 1283 Last » Next »