Sciweavers

538 search results - page 72 / 108
» Distribution concerns in service-oriented modelling
Sort
View
KAIS
2008
99views more  KAIS 2008»
13 years 7 months ago
Privacy-preserving SVM classification
Classical data mining algorithms implicitly assume complete access to all data, either in centralized or federated form. However, privacy and security concerns often prevent sharin...
Jaideep Vaidya, Hwanjo Yu, Xiaoqian Jiang
JMLR
2010
125views more  JMLR 2010»
13 years 2 months ago
Regret Bounds for Gaussian Process Bandit Problems
Bandit algorithms are concerned with trading exploration with exploitation where a number of options are available but we can only learn their quality by experimenting with them. ...
Steffen Grünewälder, Jean-Yves Audibert,...
GIS
2008
ACM
14 years 8 months ago
Quantifying spatial prepositions: an experimental study
Many aspects of spatial language concerned with relationships between spatial entities are essentially vague. Current GIS technology provides very little support for dealing with ...
Mark M. Hall, Christopher B. Jones
AVSS
2006
IEEE
14 years 1 months ago
On the Performance and Use of Speaker Recognition Systems for Surveillance
We model the performance of a speaker recognition system used for surveillance to prioritize a large number of candidate speakers in search of a single target speaker. It is assum...
Peter J. Barger, Sridha Sridharan
PPPJ
2004
ACM
14 years 1 months ago
Embedding JAAS in agent roles to apply local security policies
Agents are an emerging technology that grants programmers a new way to exploit distributed resources. Roles are a powerful concept that can be used to model agent interactions, all...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi