Sciweavers

1359 search results - page 262 / 272
» Black-Box Program Specialization
Sort
View
ESANN
2004
14 years 5 days ago
Neural networks for data mining: constrains and open problems
When we talk about using neural networks for data mining we have in mind the original data mining scope and challenge. How did neural networks meet this challenge? Can we run neura...
Razvan Andonie, Boris Kovalerchuk
CIDR
2003
106views Algorithms» more  CIDR 2003»
14 years 5 days ago
Speculative Query Processing
Speculation is an every day phenomenon whereby one acts in anticipation of particular conditions that are likely to hold in the future. Computer science research has seen many suc...
Neoklis Polyzotis, Yannis E. Ioannidis
WIS
2004
14 years 4 days ago
Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users
: To enable users to utilize the services of various providers of multimedia services based on the session initiation protocol (SIP), some kind of interaction is required between t...
Dorgham Sisalem, Jiri Kuthan
AAAI
2000
14 years 4 days ago
Decision Making under Uncertainty: Operations Research Meets AI (Again)
Models for sequential decision making under uncertainty (e.g., Markov decision processes,or MDPs) have beenstudied in operations research for decades. The recent incorporation of ...
Craig Boutilier
UAI
2007
13 years 12 months ago
"I Can Name that Bayesian Network in Two Matrixes!"
The traditional approach to building Bayesian networks is to build the graphical structure using a graphical editor and then add probabilities using a separate spreadsheet for eac...
Russell Almond