Sciweavers

1291 search results - page 166 / 259
» Learning Rules from Distributed Data
Sort
View
150
Voted
AIPRF
2008
15 years 4 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
119
Voted
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 6 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
131
Voted
BMCBI
2008
174views more  BMCBI 2008»
15 years 2 months ago
Evolutionary approaches for the reverse-engineering of gene regulatory networks: A study on a biologically realistic dataset
Background: Inferring gene regulatory networks from data requires the development of algorithms devoted to structure extraction. When only static data are available, gene interact...
Cédric Auliac, Vincent Frouin, Xavier Gidro...
257
Voted
DCC
2011
IEEE
14 years 9 months ago
Robust Learning of 2-D Separable Transforms for Next-Generation Video Coding
With the simplicity of its application together with compression efficiency, the Discrete Cosine Transform(DCT) plays a vital role in the development of video compression standar...
Osman Gokhan Sezer, Robert A. Cohen, Anthony Vetro
130
Voted
ATAL
2007
Springer
15 years 9 months ago
Batch reinforcement learning in a complex domain
Temporal difference reinforcement learning algorithms are perfectly suited to autonomous agents because they learn directly from an agent’s experience based on sequential actio...
Shivaram Kalyanakrishnan, Peter Stone