Sciweavers

592 search results - page 43 / 119
» Learning of personalized security settings
Sort
View
IDEAL
2005
Springer
14 years 1 months ago
Probabilistic Data Generation for Deduplication and Data Linkage
Abstract. In many data mining projects the data to be analysed contains personal information, like names and addresses. Cleaning and preprocessing of such data likely involves dedu...
Peter Christen
RAS
2010
164views more  RAS 2010»
13 years 6 months ago
Towards performing everyday manipulation activities
This article investigates fundamental issues in scaling autonomous personal robots towards open-ended sets of everyday manipulation tasks which involve high complexity and vague j...
Michael Beetz, Dominik Jain, Lorenz Mösenlech...
ATAL
2007
Springer
14 years 2 months ago
Multiagent reinforcement learning and self-organization in a network of agents
To cope with large scale, agents are usually organized in a network such that an agent interacts only with its immediate neighbors in the network. Reinforcement learning technique...
Sherief Abdallah, Victor R. Lesser
ICALP
2001
Springer
14 years 10 days ago
Separating Quantum and Classical Learning
We consider a model of learning Boolean functions from quantum membership queries. This model was studied in [26], where it was shown that any class of Boolean functions which is i...
Rocco A. Servedio
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
13 years 11 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani