Sciweavers

735 search results - page 64 / 147
» Margin based feature selection - theory and algorithms
Sort
View
WWW
2006
ACM
14 years 8 months ago
Semantic WS-agreement partner selection
In a dynamic service oriented environment it is desirable for service consumers and providers to offer and obtain guarantees regarding their capabilities and requirements. WS-Agre...
Nicole Oldham, Kunal Verma, Amit P. Sheth, Farshad...
CORR
2010
Springer
204views Education» more  CORR 2010»
13 years 6 months ago
Predictive State Temporal Difference Learning
We propose a new approach to value function approximation which combines linear temporal difference reinforcement learning with subspace identification. In practical applications...
Byron Boots, Geoffrey J. Gordon
CSDA
2008
147views more  CSDA 2008»
13 years 7 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
COLT
2010
Springer
13 years 5 months ago
Forest Density Estimation
We study graph estimation and density estimation in high dimensions, using a family of density estimators based on forest structured undirected graphical models. For density estim...
Anupam Gupta, John D. Lafferty, Han Liu, Larry A. ...
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
14 years 1 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002