Sciweavers

592 search results - page 95 / 119
» Learning of personalized security settings
Sort
View
GECCO
2003
Springer
160views Optimization» more  GECCO 2003»
15 years 7 months ago
Using Genetic Algorithms for Data Mining Optimization in an Educational Web-Based System
This paper presents an approach for classifying students in order to predict their final grade based on features extracted from logged data in an education web-based system. A comb...
Behrouz Minaei-Bidgoli, William F. Punch
89
Voted
IPMU
2010
Springer
15 years 6 months ago
Independent Natural Extension
We introduce a general definition for the independence of a number of finite-valued variables, based on coherent lower previsions. Our definition has an epistemic flavour: it a...
Gert de Cooman, Enrique Miranda, Marco Zaffalon
WWW
2008
ACM
16 years 2 months ago
Detecting image spam using visual features and near duplicate detection
Email spam is a much studied topic, but even though current email spam detecting software has been gaining a competitive edge against text based email spam, new advances in spam g...
Bhaskar Mehta, Saurabh Nangia, Manish Gupta 0002, ...
CSREASAM
2008
15 years 3 months ago
On Providing Automatic Parental Consent over Information Collection from Children
: Children's privacy has become critical with the increasing use of the Internet for commercial purposes and corresponding increase in requests for information. 65% of childre...
Karthik Channakeshava, Kaigui Bian, Michael S. Hsi...
IHI
2010
197views Healthcare» more  IHI 2010»
14 years 8 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...