Sciweavers

977 search results - page 163 / 196
» An Algebraic Approach to Data Mining: Some Examples
Sort
View
AIIA
1997
Springer
13 years 11 months ago
Introducing Abduction into (Extensional) Inductive Logic Programming Systems
We propose an approach for the integration of abduction and induction in Logic Programming. In particular, we show how it is possible to learn an abductive logic program starting f...
Evelina Lamma, Paola Mello, Michela Milano, Fabriz...
ACSC
2007
IEEE
13 years 11 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
VISUALIZATION
1995
IEEE
13 years 11 months ago
Iconic Techniques for Feature Visualization
This paper presents a conceptual framework and a process model for feature extraction and iconic visualization. Fearaction is viewed as a process of data abstraction, which can pr...
Frank J. Post, Theo van Walsum, Frits H. Post, Deb...
ALT
2010
Springer
13 years 9 months ago
Optimal Online Prediction in Adversarial Environments
: In many prediction problems, including those that arise in computer security and computational finance, the process generating the data is best modeled as an adversary with whom ...
Peter L. Bartlett
IJCAI
2007
13 years 8 months ago
Automated Benchmark Model Generators for Model-Based Diagnostic Inference
This article proposes a Diagnosis Interchange Format (DIF), an XML-based interchange format for Model-Based Diagnosis (MBD). Its main purposes are to allow sharing of diagnostic m...
Gregory M. Provan, Jun Wang