Sciweavers

13476 search results - page 2468 / 2696
» Learning from Streams
Sort
View
ISI
2006
Springer
15 years 4 months ago
Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders
Abstract. In many organizations, it is common to control access to confidential information based on the need-to-know principle; The requests for access are authorized only if the ...
Young-Woo Seo, Katia P. Sycara
ITSSA
2006
109views more  ITSSA 2006»
15 years 4 months ago
Gene Expression Analysis in Multi-Agent Environment
Abstract. This paper presents a multi-agent approach to gene expression analysis and illustrates the working steps using real dataset produced from a microarray experiment. The ana...
H. C. Lam, M. Vazquez, B. Juneja, Scott C. Fahrenk...
JMLR
2008
209views more  JMLR 2008»
15 years 4 months ago
Bayesian Inference and Optimal Design for the Sparse Linear Model
The linear model with sparsity-favouring prior on the coefficients has important applications in many different domains. In machine learning, most methods to date search for maxim...
Matthias W. Seeger
JMLR
2008
148views more  JMLR 2008»
15 years 4 months ago
Linear-Time Computation of Similarity Measures for Sequential Data
Efficient and expressive comparison of sequences is an essential procedure for learning with sequential data. In this article we propose a generic framework for computation of sim...
Konrad Rieck, Pavel Laskov
JODS
2008
152views Data Mining» more  JODS 2008»
15 years 4 months ago
Deploying Semantic Web Services-Based Applications in the e-Government Domain
Joining up services in e-Government usually implies governmental agencies acting in concert without a central control regime. This requires to the sharing scattered and heterogeneo...
Alessio Gugliotta, John Domingue, Liliana Cabral, ...
« Prev « First page 2468 / 2696 Last » Next »