Sciweavers

551 search results - page 14 / 111
» Preventing existence
Sort
View
JMLR
2012
12 years 12 months ago
Lifted coordinate descent for learning with trace-norm regularization
We consider the minimization of a smooth loss with trace-norm regularization, which is a natural objective in multi-class and multitask learning. Even though the problem is convex...
Miroslav Dudík, Zaïd Harchaoui, J&eacu...
PTS
2007
120views Hardware» more  PTS 2007»
14 years 11 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
COMCOM
2007
149views more  COMCOM 2007»
14 years 9 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
HCI
2009
14 years 7 months ago
Mobile-Banking Adoption and Usage by Low-Literate, Low-Income Users in the Developing World
Due to the increasing penetration of mobile phones even in poor communities, mobile-phone-enabled banking (m-banking) services are being increasingly targeted at the "unbanked...
Indrani Medhi, Aishwarya Ratan, Kentaro Toyama
HASE
2008
IEEE
15 years 3 months ago
A Multi-Periodic Synchronous Data-Flow Language
Implementing real-time critical systems is an increasingly complex process that calls for high-level formal programming languages. Existing languages mainly focus on mono-periodic...
Julien Forget, Frédéric Boniol, Davi...