Sciweavers

6343 search results - page 1258 / 1269
» Robust consensus computation
Sort
View
90
Voted
JAIR
2010
145views more  JAIR 2010»
14 years 10 months ago
On Action Theory Change
As historically acknowledged in the Reasoning about Actions and Change community, intuitiveness of a logical domain description cannot be fully automated. Moreover, like any other...
Ivan José Varzinczak
MA
2010
Springer
94views Communications» more  MA 2010»
14 years 10 months ago
On sparse estimation for semiparametric linear transformation models
: Semiparametric linear transformation models have received much attention due to its high flexibility in modeling survival data. A useful estimating equation procedure was recent...
Hao Helen Zhang, Wenbin Lu, Hansheng Wang
MA
2010
Springer
172views Communications» more  MA 2010»
14 years 10 months ago
On Monte Carlo methods for Bayesian multivariate regression models with heavy-tailed errors
We consider Bayesian analysis of data from multivariate linear regression models whose errors have a distribution that is a scale mixture of normals. Such models are used to analy...
Vivekananda Roy, James P. Hobert
ML
2010
ACM
119views Machine Learning» more  ML 2010»
14 years 10 months ago
A cooperative coevolutionary algorithm for instance selection for instance-based learning
This paper presents a cooperative evolutionary approach for the problem of instance selection for instance based learning. The presented model takes advantage of one of the most r...
Nicolás García-Pedrajas, Juan Antoni...
TMC
2010
179views more  TMC 2010»
14 years 10 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
« Prev « First page 1258 / 1269 Last » Next »