Sciweavers

1227 search results - page 159 / 246
» Learning Rates for Q-Learning
Sort
View
CORR
2010
Springer
149views Education» more  CORR 2010»
14 years 10 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
CORR
2010
Springer
103views Education» more  CORR 2010»
14 years 10 months ago
On the Finite Time Convergence of Cyclic Coordinate Descent Methods
Cyclic coordinate descent is a classic optimization method that has witnessed a resurgence of interest in machine learning. Reasons for this include its simplicity, speed and stab...
Ankan Saha, Ambuj Tewari
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 10 months ago
Information Acquisition and Exploitation in Multichannel Wireless Networks
A wireless system with multiple channels is considered, where each channel has several transmission states. A user learns about the instantaneous state of an available channel by ...
Sudipto Guha, Kamesh Munagala, Saswati Sarkar
ISI
2006
Springer
14 years 9 months ago
Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders
Abstract. In many organizations, it is common to control access to confidential information based on the need-to-know principle; The requests for access are authorized only if the ...
Young-Woo Seo, Katia P. Sycara
PAMI
2006
185views more  PAMI 2006»
14 years 9 months ago
Generic Object Recognition with Boosting
This paper explores the power and the limitations of weakly supervised categorization. We present a complete framework that starts with the extraction of various local regions of e...
Andreas Opelt, Axel Pinz, Michael Fussenegger, Pet...