Sciweavers

295 search results - page 31 / 59
» A framework for quantitative security analysis of machine le...
Sort
View
ICML
2010
IEEE
13 years 10 months ago
A scalable trust-region algorithm with application to mixed-norm regression
We present a new algorithm for minimizing a convex loss-function subject to regularization. Our framework applies to numerous problems in machine learning and statistics; notably,...
Dongmin Kim, Suvrit Sra, Inderjit S. Dhillon
BMCBI
2008
100views more  BMCBI 2008»
13 years 9 months ago
High-precision high-coverage functional inference from integrated data sources
Background: Information obtained from diverse data sources can be combined in a principled manner using various machine learning methods to increase the reliability and range of k...
Bolan Linghu, Evan S. Snitkin, Dustin T. Holloway,...
ACSAC
2010
IEEE
13 years 7 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
KI
2007
Springer
14 years 3 months ago
Relational Exploration - Reconciling Plato and Aristotle
Abstract. We provide an interactive method for knowledge acquisition combining approaches from description logic and formal concept analysis. Based on present data, hypothetical ru...
Sebastian Rudolph
CJ
1998
118views more  CJ 1998»
13 years 8 months ago
Least-Squares Structuring, Clustering and Data Processing Issues
Approximation structuring clustering is an extension of what is usually called square-error clustering" onto various cluster structures and data formats. It appears to be not...
Boris Mirkin