Sciweavers

169 search results - page 19 / 34
» Learning Languages from Positive Data and Negative Counterex...
Sort
View
VIZSEC
2004
Springer
14 years 1 months ago
User re-authentication via mouse movements
We present an approach to user re-authentication based on the data collected from the computer’s mouse device. Our underlying hypothesis is that one can successfully model user ...
Maja Pusara, Carla E. Brodley
FATES
2003
Springer
14 years 29 days ago
Auto-generating Test Sequences Using Model Checkers: A Case Study
Use of model-checking approaches for test generation from requirement models have been proposed by several researchers. These approaches leverage the witness (or counter-example) ...
Mats Per Erik Heimdahl, Sanjai Rayadurgam, Willem ...
AAAI
2010
13 years 9 months ago
Recognizing Multi-Agent Activities from GPS Data
Recent research has shown that surprisingly rich models of human behavior can be learned from GPS (positional) data. However, most research to date has concentrated on modeling si...
Adam Sadilek, Henry A. Kautz
COLT
2006
Springer
13 years 11 months ago
Memory-Limited U-Shaped Learning
U-shaped learning is a learning behaviour in which the learner first learns a given target behaviour, then unlearns it and finally relearns it. Such a behaviour, observed by psych...
Lorenzo Carlucci, John Case, Sanjay Jain, Frank St...
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
14 years 2 months ago
Set-Based Boosting for Instance-Level Transfer
—The success of transfer to improve learning on a target task is highly dependent on the selected source data. Instance-based transfer methods reuse data from the source tasks to...
Eric Eaton, Marie desJardins