Sciweavers

1779 search results - page 296 / 356
» A Formal Model of Data Privacy
Sort
View
ICML
2007
IEEE
16 years 4 months ago
Multi-armed bandit problems with dependent arms
We provide a framework to exploit dependencies among arms in multi-armed bandit problems, when the dependencies are in the form of a generative model on clusters of arms. We find ...
Sandeep Pandey, Deepayan Chakrabarti, Deepak Agarw...
128
Voted
ICML
2004
IEEE
16 years 4 months ago
Learning and evaluating classifiers under sample selection bias
Classifier learning methods commonly assume that the training data consist of randomly drawn examples from the same distribution as the test examples about which the learned model...
Bianca Zadrozny
154
Voted
ICML
1996
IEEE
16 years 4 months ago
Discretizing Continuous Attributes While Learning Bayesian Networks
We introduce a method for learning Bayesian networks that handles the discretization of continuous variables as an integral part of the learning process. The main ingredient in th...
Moisés Goldszmidt, Nir Friedman
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 4 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
WWW
2009
ACM
15 years 10 months ago
Instance-based probabilistic reasoning in the semantic web
Most of the approaches for dealing with uncertainty in the Semantic Web rely on the principle that this uncertainty is already asserted. In this paper, we propose a new approach t...
Pedro Oliveira, Paulo Gomes