Sciweavers

1510 search results - page 131 / 302
» Upper Probabilities and Additivity
Sort
View
TRUSTBUS
2005
Springer
15 years 3 months ago
Protection Mechanisms Against Phishing Attacks
Abstract. Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probabi...
Klaus Plößl, Hannes Federrath, Thomas N...
ICANN
2003
Springer
15 years 3 months ago
Learning Rule Representations from Boolean Data
We discuss a Probably Approximate Correct (PAC) learning paradigm for Boolean formulas, which we call PAC meditation, where the class of formulas to be learnt is not known in advan...
Bruno Apolloni, Andrea Brega, Dario Malchiodi, Gio...
NIPS
2001
14 years 11 months ago
Boosting and Maximum Likelihood for Exponential Models
We derive an equivalence between AdaBoost and the dual of a convex optimization problem, showing that the only difference between minimizing the exponential loss used by AdaBoost ...
Guy Lebanon, John D. Lafferty
MSS
2008
IEEE
112views Hardware» more  MSS 2008»
14 years 10 months ago
Axiomatization of stochastic models for choice under uncertainty
: This paper develops a theory of probabilistic models for risky choices. Part of this theory can be viewed as an extension of the expected utility theory to account for bounded ra...
John K. Dagsvik
TWC
2008
106views more  TWC 2008»
14 years 10 months ago
Analysis of Handoff Interference and Outage along Arbitrary Trajectories in Cellular Networks
We introduce a new system performance measure due to handoff called handoff interference, which characterizes the additional interference noise induced by the handoff process. The ...
A. Leu, B. Mark, S. Tang