Sciweavers

592 search results - page 69 / 119
» Learning of personalized security settings
Sort
View
IIS
2000
13 years 9 months ago
Optimization and Interpretation of Rule-based Classifiers
Machine learning methods are frequently used to create rule-based classifiers. For continuous features linguistic variables used in conditions of the rules are defined by membershi...
Wlodzislaw Duch, Norbert Jankowski, Krzysztof Grab...
CORR
2006
Springer
118views Education» more  CORR 2006»
13 years 7 months ago
Minimally Invasive Randomization for Collecting Unbiased Preferences from Clickthrough Logs
Clickthrough data is a particularly inexpensive and plentiful resource to obtain implicit relevance feedback for improving and personalizing search engines. However, it is well kn...
Filip Radlinski, Thorsten Joachims
CGF
2007
127views more  CGF 2007»
13 years 7 months ago
Crowds by Example
We present an example-based crowd simulation technique. Most crowd simulation techniques assume that the behavior exhibited by each person in the crowd can be defined by a restri...
Alon Lerner, Yiorgos Chrysanthou, Dani Lischinski
GECCO
2005
Springer
160views Optimization» more  GECCO 2005»
14 years 1 months ago
Exploring relationships between genotype and oral cancer development through XCS
In medical research, being able to justify decisions is generally as important as taking the right ones. Interpretability is then one of the chief characteristics a learning algor...
Alessandro Passaro, Flavio Baronti, Valentina Magg...
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
14 years 8 months ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov