Sciweavers

4903 search results - page 871 / 981
» The Set Covering Machine
Sort
View
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 9 months ago
Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using ...
Stevens Le-Blond, Arnaud Legout, Fabrice Le Fessan...
CORR
2010
Springer
100views Education» more  CORR 2010»
13 years 9 months ago
Products of Weighted Logic Programs
Abstract. Weighted logic programming, a generalization of bottom-up logic programming, is a successful framework for specifying dynamic programming algorithms. In this setting, pro...
Shay B. Cohen, Robert J. Simmons, Noah A. Smith
CORR
2008
Springer
91views Education» more  CORR 2008»
13 years 9 months ago
Randomised Variable Neighbourhood Search for Multi Objective Optimisation
Various local search approaches have recently been applied to machine scheduling problems under multiple objectives. Their foremost consideration is the identification of the set ...
Martin Josef Geiger
CSL
2010
Springer
13 years 9 months ago
Evaluation of a hierarchical reinforcement learning spoken dialogue system
We describe an evaluation of spoken dialogue strategies designed using hierarchical reinforcement learning agents. The dialogue strategies were learnt in a simulated environment a...
Heriberto Cuayáhuitl, Steve Renals, Oliver ...
DATAMINE
2010
122views more  DATAMINE 2010»
13 years 9 months ago
Three naive Bayes approaches for discrimination-free classification
In this paper, we investigate how to modify the Naive Bayes classifier in order to perform classification that is restricted to be independent with respect to a given sensitive att...
Toon Calders, Sicco Verwer