Sciweavers

1328 search results - page 191 / 266
» Common Knowledge
Sort
View
FC
2010
Springer
150views Cryptology» more  FC 2010»
13 years 10 months ago
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Abstract. It is becoming more common for researchers to find themselves in a position of being able to take over control of a malicious botnet. If this happens, should they use thi...
David Dittrich, Felix Leder, Tillmann Werner
GECCO
2008
Springer
174views Optimization» more  GECCO 2008»
13 years 9 months ago
Mask functions for the symbolic modeling of epistasis using genetic programming
The study of common, complex multifactorial diseases in genetic epidemiology is complicated by nonlinearity in the genotype-to-phenotype mapping relationship that is due, in part,...
Ryan J. Urbanowicz, Nate Barney, Bill C. White, Ja...
ICML
2010
IEEE
13 years 9 months ago
Local Minima Embedding
Dimensionality reduction is a commonly used step in many algorithms for visualization, classification, clustering and modeling. Most dimensionality reduction algorithms find a low...
Minyoung Kim, Fernando De la Torre
ICML
2010
IEEE
13 years 9 months ago
Tree-Guided Group Lasso for Multi-Task Regression with Structured Sparsity
We consider the problem of learning a sparse multi-task regression, where the structure in the outputs can be represented as a tree with leaf nodes as outputs and internal nodes a...
Seyoung Kim, Eric P. Xing
ICMCS
2010
IEEE
150views Multimedia» more  ICMCS 2010»
13 years 9 months ago
Turning enemies into friends: Using reflections to improve sound source localization
Sound Source Localization (SSL) based on microphone arrays has numerous applications, and has received significant research attention. Common to all published research is the obs...
Flavio Ribeiro, Demba E. Ba, Cha Zhang, Dinei A. F...