Sciweavers

107 search results - page 8 / 22
» Discovering Empirical Equations from Robot-Collected Data
Sort
View
CCS
2005
ACM
14 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
JMLR
2010
134views more  JMLR 2010»
13 years 4 months ago
Bayesian Algorithms for Causal Data Mining
We present two Bayesian algorithms CD-B and CD-H for discovering unconfounded cause and effect relationships from observational data without assuming causal sufficiency which prec...
Subramani Mani, Constantin F. Aliferis, Alexander ...
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
14 years 10 months ago
The offset tree for learning with partial labels
We present an algorithm, called the offset tree, for learning in situations where a loss associated with different decisions is not known, but was randomly probed. The algorithm i...
Alina Beygelzimer, John Langford
JSS
2002
128views more  JSS 2002»
13 years 9 months ago
The cost of errors in software development: evidence from industry
The search for and correction of errors in software are often time consuming and expensive components of the total cost of software development. The current research investigates ...
J. Christopher Westland
SIGMETRICS
2008
ACM
115views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Densification arising from sampling fixed graphs
During the past decade, a number of different studies have identified several peculiar properties of networks that arise from a diverse universe, ranging from social to computer n...
Pedram Pedarsani, Daniel R. Figueiredo, Matthias G...