Sciweavers

5055 search results - page 63 / 1011
» Relative Timing
Sort
View
DIMVA
2007
15 years 3 months ago
Protecting the Intranet Against "JavaScript Malware" and Related Attacks
The networking functionality of JavaScript is restricted by the Same Origin Policy (SOP). However, as the SOP applies on a document level, JavaScript still possesses certain functi...
Martin Johns, Justus Winter
IJCAI
2007
15 years 3 months ago
On Mining Closed Sets in Multi-Relational Data
We investigate the problem of mining closed sets in multi-relational databases. Previous work introduced different semantics and associated algorithms for mining closed sets in mu...
Gemma C. Garriga, Roni Khardon, Luc De Raedt
FLAIRS
2004
15 years 3 months ago
Mining Bayesian Networks to Forecast Adverse Outcomes Related to Acute Coronary Syndrome
One fascinating aspect of tool building for datamining is the application of a generalized datamining tool to a specific domain. Often times, this process results in a cross disci...
Andy Novobilski, Francis M. Fesmire, David Sonnema...
DAGSTUHL
1996
15 years 3 months ago
Specialization of Imperative Programs Through Analysis of Relational Expressions
An analysis method for specialization of imperative programs is described in this paper. This analysis is an inter-procedural data flow method operating on control flow graphs and...
Alexander Sakharov
NN
2006
Springer
127views Neural Networks» more  NN 2006»
15 years 2 months ago
The asymptotic equipartition property in reinforcement learning and its relation to return maximization
We discuss an important property called the asymptotic equipartition property on empirical sequences in reinforcement learning. This states that the typical set of empirical seque...
Kazunori Iwata, Kazushi Ikeda, Hideaki Sakai