Sciweavers

543 search results - page 86 / 109
» Methods for Empirical Game-Theoretic Analysis
Sort
View
FC
2009
Springer
106views Cryptology» more  FC 2009»
14 years 2 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton
ICPR
2008
IEEE
14 years 2 months ago
Harmonic mean for subspace selection
Under the homoscedastic Gaussian assumption, it has been shown that Fisher’s linear discriminant analysis (FLDA) suffers from the class separation problem when the dimensionalit...
Wei Bian, Dacheng Tao
ADC
2008
Springer
112views Database» more  ADC 2008»
14 years 2 months ago
Semantics based Buffer Reduction for Queries over XML Data Streams
With respect to current methods for query evaluation over XML data streams, adoption of certain types of buffering techniques is unavoidable. Under lots of circumstances, the buff...
Chi Yang, Chengfei Liu, Jianxin Li, Jeffrey Xu Yu,...
ICDM
2007
IEEE
254views Data Mining» more  ICDM 2007»
14 years 1 months ago
Sampling for Sequential Pattern Mining: From Static Databases to Data Streams
Sequential pattern mining is an active field in the domain of knowledge discovery. Recently, with the constant progress in hardware technologies, real-world databases tend to gro...
Chedy Raïssi, Pascal Poncelet
GECCO
2007
Springer
276views Optimization» more  GECCO 2007»
14 years 1 months ago
Meta-optimizing semantic evolutionary search
I present MOSES (meta-optimizing semantic evolutionary search), a new probabilistic modeling (estimation of distribution) approach to program evolution. Distributions are not esti...
Moshe Looks