Sciweavers

2829 search results - page 110 / 566
» Regularization Methods for Additive Models
Sort
View
ICDM
2007
IEEE
187views Data Mining» more  ICDM 2007»
15 years 8 months ago
A Comparative Study of Methods for Transductive Transfer Learning
The problem of transfer learning, where information gained in one learning task is used to improve performance in another related task, is an important new area of research. While...
Andrew Arnold, Ramesh Nallapati, William W. Cohen
92
Voted
HICSS
2002
IEEE
89views Biometrics» more  HICSS 2002»
15 years 7 months ago
A Longitudinal Analysis of GSS Use in the Case Method Classroom
This exploratory study reports on term-long use of a discussion-based GSS by 137 undergraduate business students in a case-based core MIS course. We develop a model of student par...
Michael Parent, Derrick J. Neufeld, R. Brent Gallu...
IJSN
2007
73views more  IJSN 2007»
15 years 2 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji
117
Voted
PAMI
2002
112views more  PAMI 2002»
15 years 2 months ago
Feature Space Trajectory Methods for Active Computer Vision
We advance new active object recognition algorithms that classify rigid objects and estimate their pose from intensity images. Our algorithms automatically detect if the class or p...
Michael A. Sipe, David Casasent
CORR
2011
Springer
142views Education» more  CORR 2011»
14 years 9 months ago
A Logical Method for Policy Enforcement over Evolving Audit Logs
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Priva...
Deepak Garg, Limin Jia, Anupam Datta