Sciweavers

1669 search results - page 4 / 334
» SMO-Style Algorithms for Learning Using Privileged Informati...
Sort
View
ATAL
2007
Springer
13 years 11 months ago
A reinforcement learning based distributed search algorithm for hierarchical peer-to-peer information retrieval systems
The dominant existing routing strategies employed in peerto-peer(P2P) based information retrieval(IR) systems are similarity-based approaches. In these approaches, agents depend o...
Haizheng Zhang, Victor R. Lesser
MEDINFO
2007
129views Healthcare» more  MEDINFO 2007»
13 years 9 months ago
Confidentiality Preserving Audits of Electronic Medical Record Access
Failure to supply a care provider with timely access to a patient's medical record can lead to patient harm or death. As such, healthcare organizations often endow care provi...
Bradley Malin, Edoardo Airoldi
IROS
2006
IEEE
132views Robotics» more  IROS 2006»
14 years 1 months ago
Supervised Learning of Topological Maps using Semantic Information Extracted from Range Data
Abstract— This paper presents an approach to create topological maps from geometric maps obtained with a mobile robot in an indoor-environment using range data. Our approach util...
Óscar Martínez Mozos, Wolfram Burgar...
KDD
2009
ACM
205views Data Mining» more  KDD 2009»
14 years 2 months ago
From active towards InterActive learning: using consideration information to improve labeling correctness
Data mining techniques have become central to many applications. Most of those applications rely on so called supervised learning algorithms, which learn from given examples in th...
Abraham Bernstein, Jiwen Li
PAKDD
2004
ACM
100views Data Mining» more  PAKDD 2004»
14 years 28 days ago
Using Self-Consistent Naive-Bayes to Detect Masquerades
To gain access to account privileges, an intruder masquerades as the proper account user. This paper proposes a new strategy for detecting masquerades in a multiuser system. To det...
Kwong H. Yung