Sciweavers

592 search results - page 23 / 119
» Learning of personalized security settings
Sort
View
AGENTS
2001
Springer
13 years 11 months ago
Collaborative multiagent learning for classification tasks
Multiagent learning di ers from standard machine learning in that most existing learning methods assume that all knowledge is available locally in a single agent. In multiagent sy...
Pragnesh Jay Modi, Wei-Min Shen
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
14 years 10 days ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
SIBGRAPI
2009
IEEE
14 years 2 months ago
Learning Discriminative Appearance-Based Models Using Partial Least Squares
Appearance information is essential for applications such as tracking and people recognition. One of the main problems of using appearance-based discriminative models is the ambig...
William Robson Schwartz, Larry S. Davis
ICDCS
2012
IEEE
11 years 10 months ago
Securing Virtual Coordinates by Enforcing Physical Laws
—Virtual coordinate systems (VCS) provide accurate estimations of latency between arbitrary hosts on a network, while conducting a small amount of actual measurements and relying...
Jeffrey Seibert, Sheila Becker, Cristina Nita-Rota...
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 8 months ago
Efficient anonymity-preserving data collection
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwilling to provide accurate data about sensitive topics such as medical history an...
Justin Brickell, Vitaly Shmatikov