Sciweavers

6368 search results - page 1265 / 1274
» Modeling Problem Transformations based on Data Complexity
Sort
View
ICML
2005
IEEE
15 years 10 months ago
Healing the relevance vector machine through augmentation
The Relevance Vector Machine (RVM) is a sparse approximate Bayesian kernel method. It provides full predictive distributions for test cases. However, the predictive uncertainties ...
Carl Edward Rasmussen, Joaquin Quiñonero Ca...
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 4 months ago
An Empirical Analysis of Fraud Detection in Online Auctions: Credit Card Phantom Transaction
The online auction is a well-known business model that shows how business can be changed with the aid of new technologies. On the other hand, although the online auction allows bu...
Myungsin Chae, Seonyoung Shim, Hyungjun Cho, Byung...
VLDB
2005
ACM
96views Database» more  VLDB 2005»
15 years 3 months ago
Supporting RFID-based Item Tracking Applications in Oracle DBMS Using a Bitmap Datatype
Radio Frequency Identification (RFID) based item-level tracking holds the promise of revolutionizing supply-chain, retail store, and asset management applications. However, the hi...
Ying Hu, Seema Sundara, Timothy Chorma, Jagannatha...
STOC
2010
ACM
170views Algorithms» more  STOC 2010»
15 years 2 months ago
Connectivity oracles for failure prone graphs
Dynamic graph connectivity algorithms have been studied for many years, but typically in the most general possible setting, where the graph can evolve in completely arbitrary ways...
Ran Duan, Seth Pettie
92
Voted
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
« Prev « First page 1265 / 1274 Last » Next »