Sciweavers

4446 search results - page 823 / 890
» Learning Observer Agents
Sort
View
IADIS
2004
14 years 11 months ago
Detecting Unauthorized Use in Online Journal Archives: A Case Study
JSTOR is a not-for-profit online library containing a full back-run of digitized versions of a large number of academic journals. In order to help defray costs for maintaining the...
Paul Seligman, Sean W. Smith
ACE
2003
86views Education» more  ACE 2003»
14 years 11 months ago
A New Approach to a First Year Undergraduate Information Systems Course
This paper describes the development, implementation and evaluation of a new teaching approach for a large first year undergraduate course in information systems at the University...
Denise Tolhurst, Bob Baker
CSREASAM
2003
14 years 11 months ago
KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually throug...
Maheshkumar Sabhnani, Gürsel Serpen
NIPS
2004
14 years 11 months ago
Worst-Case Analysis of Selective Sampling for Linear-Threshold Algorithms
We provide a worst-case analysis of selective sampling algorithms for learning linear threshold functions. The algorithms considered in this paper are Perceptron-like algorithms, ...
Nicolò Cesa-Bianchi, Claudio Gentile, Luca ...
NIPS
2004
14 years 11 months ago
Identifying Protein-Protein Interaction Sites on a Genome-Wide Scale
Protein interactions typically arise from a physical interaction of one or more small sites on the surface of the two proteins. Identifying these sites is very important for drug ...
Haidong Wang, Eran Segal, Asa Ben-Hur, Daphne Koll...