Sciweavers

658 search results - page 34 / 132
» Open problems in the security of learning
Sort
View
ISSA
2004
13 years 10 months ago
Are Current B2b Security Standards Antithetical To Global Interoperability?
This paper argues that powerful impetus exists for the realisation of a global multilateral electronic market infrastructure, as envisaged by the ebXML1 endeavour. Crucial in this...
Maree Pather
ML
2008
ACM
13 years 9 months ago
Inductive process modeling
In this paper, we pose a novel research problem for machine learning that involves constructing a process model from continuous data. We claim that casting learned knowledge in ter...
Will Bridewell, Pat Langley, Ljupco Todorovski, Sa...
ATAL
2011
Springer
12 years 9 months ago
A double oracle algorithm for zero-sum security games on graphs
In response to the Mumbai attacks of 2008, the Mumbai police have started to schedule a limited number of inspection checkpoints on the road network throughout the city. Algorithm...
Manish Jain, Dmytro Korzhyk, Ondrej Vanek, Vincent...
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
14 years 1 months ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiď...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
AGENTS
1999
Springer
14 years 1 months ago
General Principles of Learning-Based Multi-Agent Systems
We consider the problem of how to design large decentralized multiagent systems (MAS’s) in an automated fashion, with little or no hand-tuning. Our approach has each agent run a...
David Wolpert, Kevin R. Wheeler, Kagan Tumer