Sciweavers

1658 search results - page 265 / 332
» Layout of Bayesian Networks
Sort
View
ECRIME
2007
13 years 11 months ago
A comparison of machine learning techniques for phishing detection
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
EDOC
2009
IEEE
13 years 11 months ago
Enterprise Architecture Analysis for Data Accuracy Assessments
- Poor data in information systems impede the quality of decision-making in many modern organizations. Manual business process activities and application services are never execute...
Per Närman, Pontus Johnson, Mathias Ekstedt, ...
AI
2006
Springer
13 years 11 months ago
Modeling Causal Reinforcement and Undermining with Noisy-AND Trees
Abstract. Causal modeling, such as noisy-OR, reduces probability parameters to be acquired in constructing a Bayesian network. Multiple causes can reinforce each other in producing...
Y. Xiang, N. Jia
ATAL
2006
Springer
13 years 11 months ago
Agent interface enhancement: making multiagent graphical models accessible
Multiagent probabilistic reasoning with multiply sectioned Bayesian networks requires interfacing agent subnets (the modeling task) subject to a set of conditions. To specify the ...
Yang Xiang, Kun Zhang
ECML
2006
Springer
13 years 11 months ago
EM Algorithm for Symmetric Causal Independence Models
Causal independence modelling is a well-known method both for reducing the size of probability tables and for explaining the underlying mechanisms in Bayesian networks. In this pap...
Rasa Jurgelenaite, Tom Heskes