Sciweavers

1211 search results - page 58 / 243
» Computing Manipulations of Ranking Systems
Sort
View
AUSDM
2007
Springer
110views Data Mining» more  AUSDM 2007»
14 years 1 months ago
Adaptive Spike Detection for Resilient Data Stream Mining
Automated adversarial detection systems can fail when under attack by adversaries. As part of a resilient data stream mining system to reduce the possibility of such failure, adap...
Clifton Phua, Kate Smith-Miles, Vincent C. S. Lee,...
SPIRE
2010
Springer
13 years 6 months ago
Fingerprinting Ratings for Collaborative Filtering - Theoretical and Empirical Analysis
Abstract. We consider fingerprinting methods for collaborative filtering (CF) systems. In general, CF systems show their real strength when supplied with enormous data sets. Earl...
Yoram Bachrach, Ralf Herbrich
NECO
2010
147views more  NECO 2010»
13 years 6 months ago
Connectivity, Dynamics, and Memory in Reservoir Computing with Binary and Analog Neurons
Abstract: Reservoir Computing (RC) systems are powerful models for online computations on input sequences. They consist of a memoryless readout neuron which is trained on top of a ...
Lars Büsing, Benjamin Schrauwen, Robert A. Le...
AISC
2008
Springer
13 years 9 months ago
Extending Graphical Representations for Compact Closed Categories with Applications to Symbolic Quantum Computation
Graph-based formalisms of quantum computation provide an abstract and symbolic way to represent and simulate computations. However, manual manipulation of such graphs is slow and e...
Lucas Dixon, Ross Duncan
COMPSAC
2005
IEEE
14 years 1 months ago
Using AOP to Monitor and Administer Software for Grid Computing Environments
Monitoring is a task of collecting measurements that reflect the state of a system. Administration is a collection of tasks for control and manipulation of computer systems. Monito...
Mark Grechanik, Dewayne E. Perry, Don S. Batory