Sciweavers

4345 search results - page 707 / 869
» Relational Reinforcement Learning
Sort
View
ISI
2006
Springer
14 years 10 months ago
Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders
Abstract. In many organizations, it is common to control access to confidential information based on the need-to-know principle; The requests for access are authorized only if the ...
Young-Woo Seo, Katia P. Sycara
JCNS
2006
36views more  JCNS 2006»
14 years 10 months ago
The K-complex and slow oscillation in terms of a mean-field cortical model
We use a mean-field macrocolumn model of the cerebral cortex to offer an interpretation of the K-complex of the electroencephalogram to complement those of more detailed neuron-by-...
M. T. Wilson, D. A. Steyn-Ross, J. W. Sleigh, M. L...
DKE
2007
132views more  DKE 2007»
14 years 10 months ago
Automated ontology construction for unstructured text documents
Ontology is playing an increasingly important role in knowledge management and the Semantic Web. This study presents a novel episode-based ontology construction mechanism to extra...
Chang-Shing Lee, Yuan-Fang Kao, Yau-Hwang Kuo, Mei...
NECO
2006
157views more  NECO 2006»
14 years 10 months ago
Experiments with AdaBoost.RT, an Improved Boosting Scheme for Regression
The application of boosting technique to the regression problems has received relatively little attention in contrast to the research aimed at classification problems. This paper ...
Durga L. Shrestha, Dimitri P. Solomatine
PRL
2006
121views more  PRL 2006»
14 years 10 months ago
Information-preserving hybrid data reduction based on fuzzy-rough techniques
Data reduction plays an important role in machine learning and pattern recognition with a high-dimensional data. In real-world applications data usually exists with hybrid formats...
Qinghua Hu, Daren Yu, Zongxia Xie