Sciweavers

567 search results - page 88 / 114
» On the complexity of constrained VC-classes
Sort
View
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 9 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
ICML
2010
IEEE
13 years 9 months ago
Learning Markov Logic Networks Using Structural Motifs
Markov logic networks (MLNs) use firstorder formulas to define features of Markov networks. Current MLN structure learners can only learn short clauses (4-5 literals) due to extre...
Stanley Kok, Pedro Domingos
CVPR
2008
IEEE
13 years 8 months ago
Hallucinating 3D facial shapes
This paper focuses on hallucinating a facial shape from a low-resolution 3D facial shape. Firstly, we give a constrained conformal embedding of 3D shape in R2 , which establishes ...
Gang Pan, Song Han, Zhaohui Wu
AAMAS
2008
Springer
13 years 8 months ago
A capabilities-based model for adaptive organizations
Multiagent systems have become popular over the last few years for building complex, adaptive systems in a distributed, heterogeneous setting. Multiagent systems tend to be more r...
Scott A. DeLoach, Walamitien H. Oyenan, Eric T. Ma...
CORR
2008
Springer
142views Education» more  CORR 2008»
13 years 8 months ago
A Gaussian Belief Propagation Solver for Large Scale Support Vector Machines
Support vector machines (SVMs) are an extremely successful type of classification and regression algorithms. Building an SVM entails solving a constrained convex quadratic program...
Danny Bickson, Elad Yom-Tov, Danny Dolev