Sciweavers

627 search results - page 35 / 126
» Learning from Logged Implicit Exploration Data
Sort
View
75
Voted
SEC
2008
15 years 2 months ago
Protecting Financial Institutions from Brute-Force Attacks
We examine the problem of protecting online banking accounts from password brute-forcing attacks. Our method is to create a large number of honeypot userID-password pairs. Presenta...
Cormac Herley, Dinei A. F. Florêncio
106
Voted
SIGIR
2010
ACM
15 years 4 months ago
Learning more powerful test statistics for click-based retrieval evaluation
Interleaving experiments are an attractive methodology for evaluating retrieval functions through implicit feedback. Designed as a blind and unbiased test for eliciting a preferen...
Yisong Yue, Yue Gao, Olivier Chapelle, Ya Zhang, T...
78
Voted
ICCV
2009
IEEE
1019views Computer Vision» more  ICCV 2009»
16 years 5 months ago
Similarity Functions for Categorization: from Monolithic to Category Specific
Similarity metrics that are learned from labeled training data can be advantageous in terms of performance and/or efficiency. These learned metrics can then be used in conjuncti...
Boris Babenko, Steve Branson, Serge Belongie
108
Voted
CIKM
2008
Springer
15 years 2 months ago
Are click-through data adequate for learning web search rankings?
Learning-to-rank algorithms, which can automatically adapt ranking functions in web search, require a large volume of training data. A traditional way of generating training examp...
Zhicheng Dou, Ruihua Song, Xiaojie Yuan, Ji-Rong W...
109
Voted
ICRA
2010
IEEE
133views Robotics» more  ICRA 2010»
14 years 11 months ago
Generalized model learning for Reinforcement Learning on a humanoid robot
— Reinforcement learning (RL) algorithms have long been promising methods for enabling an autonomous robot to improve its behavior on sequential decision-making tasks. The obviou...
Todd Hester, Michael Quinlan, Peter Stone