Sciweavers

232 search results - page 31 / 47
» Active Learning in the Non-realizable Case
Sort
View
ESSOS
2009
Springer
14 years 4 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
UML
2001
Springer
14 years 2 months ago
Formalization of UML-Statecharts
The work presented here is part of a project that aims at the definition of a methodology for developing realtime software systems based on UML. In fact, being relatively easy to ...
Michael von der Beeck
MM
2006
ACM
158views Multimedia» more  MM 2006»
14 years 3 months ago
Extreme video retrieval: joint maximization of human and computer performance
We present an efficient system for video search that maximizes the use of human bandwidth, while at the same time exploiting the machine’s ability to learn in real-time from use...
Alexander G. Hauptmann, Wei-Hao Lin, Rong Yan, Jun...
WCE
2008
13 years 11 months ago
Design and Implementation of an E-Learning Model by Considering Learner's Personality and Emotions
Abstract Emotion, personality and individual differences are those effective parameters on human's activities such as learning. People with different personalities show differ...
Somayeh Fatahi, M. Kazemifard, Nasser Ghasem-Aghae...
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
14 years 10 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...