Sciweavers

1020 search results - page 48 / 204
» Learning to Use Operational Advice
Sort
View
124
Voted
ICML
2006
IEEE
16 years 3 months ago
Higher order learning with graphs
Recently there has been considerable interest in learning with higher order relations (i.e., three-way or higher) in the unsupervised and semi-supervised settings. Hypergraphs and...
Sameer Agarwal, Kristin Branson, Serge Belongie
ICNC
2005
Springer
15 years 8 months ago
Applying Genetic Programming to Evolve Learned Rules for Network Anomaly Detection
The DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set is the most widely used public benchmark for testing intrusion detection systems. But the presence...
Chuanhuan Yin, Shengfeng Tian, Houkuan Huang, Jun ...
98
Voted
ISCIS
2009
Springer
15 years 9 months ago
Using 3D contours and their relations for cognitive vision and robotics
—In this work, we make use of 3D visual contours carrying geometric as well as appearance information. Between these contours, we define 3D relations that encode structural info...
Emre Baseski, Leon Bodenhagen, Nicolas Pugeault, S...
104
Voted
ICONS
2008
IEEE
15 years 9 months ago
Using User Preferences to Enhance Privacy in Pervasive Systems
With the increasing interest in developing pervasive computing technologies there is growing recognition of the problems of maintaining user privacy. In the Daidalos pervasive sys...
Elizabeth Papadopoulou, Sarah McBurney, Nick K. Ta...
116
Voted
JCS
2006
91views more  JCS 2006»
15 years 2 months ago
A survey of algebraic properties used in cryptographic protocols
Abstract: Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that ...
Véronique Cortier, Stéphanie Delaune...