Sciweavers

5463 search results - page 137 / 1093
» Evaluating algorithms that learn from data streams
Sort
View
ICARIS
2009
Springer
15 years 10 months ago
An Error Propagation Algorithm for Ad Hoc Wireless Networks
Abstract. We were inspired by the role of co-stimulation in the Biological immune system (BIS). We propose and evaluate an algorithm for energy efficient misbehavior detection in a...
Martin Drozda, Sven Schaust, Sebastian Schildt, He...
AAI
2008
101views more  AAI 2008»
15 years 4 months ago
A Replanning Algorithm for Decision Theoretic Hierarchical Planning: Principles and Empirical Evaluation
In this paper, we present a replanning algorithm for a decision-theoretic hierarchical planner, illustrate the experimental methodology we designed to investigate its performance,...
Guido Boella, Rossana Damiano
EGH
2004
Springer
15 years 8 months ago
Understanding the efficiency of GPU algorithms for matrix-matrix multiplication
Utilizing graphics hardware for general purpose numerical computations has become a topic of considerable interest. The implementation of streaming algorithms, typified by highly ...
Kayvon Fatahalian, Jeremy Sugerman, Pat Hanrahan
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 4 months ago
Multi-focal learning and its application to customer service support
In this study, we formalize a multi-focal learning problem, where training data are partitioned into several different focal groups and the prediction model will be learned within...
Yong Ge, Hui Xiong, Wenjun Zhou, Ramendra K. Sahoo...
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
15 years 8 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley