Sciweavers

2940 search results - page 465 / 588
» Relational Parametricity and Control
Sort
View
DBSEC
2003
149views Database» more  DBSEC 2003»
15 years 6 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
ISSA
2004
15 years 6 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
166
Voted
OPODIS
2004
15 years 6 months ago
Fast Localized Delaunay Triangulation
A localized Delaunay triangulation owns the following interesting properties in a wireless ad hoc setting: it can be built with localized information, the communication cost impos...
Filipe Araújo, Luís Rodrigues
167
Voted
NIPS
2001
15 years 6 months ago
Model-Free Least-Squares Policy Iteration
We propose a new approach to reinforcement learning which combines least squares function approximation with policy iteration. Our method is model-free and completely off policy. ...
Michail G. Lagoudakis, Ronald Parr
PARMA
2004
174views Database» more  PARMA 2004»
15 years 6 months ago
Fuzzy Miner - A Fuzzy System for Solving Pattern Classification Problems
The purpose of this paper is to study the problem of pattern classification as this is presented in the context of data mining. Among the various approaches we focus on the use of ...
Nikos Pelekis, Babis Theodoulidis, Ioannis Kopanak...