Sciweavers

1587 search results - page 76 / 318
» What's my method
Sort
View
JMLR
2010
104views more  JMLR 2010»
13 years 4 months ago
How to Explain Individual Classification Decisions
After building a classifier with modern tools of machine learning we typically have a black box at hand that is able to predict well for unseen data. Thus, we get an answer to the...
David Baehrens, Timon Schroeter, Stefan Harmeling,...
ESORICS
2011
Springer
12 years 9 months ago
Protecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a...
Yuchen Zhou, David Evans
EDOC
2005
IEEE
14 years 3 months ago
Assessment of Enterprise Information Security - The Importance of Prioritization
Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
Erik Johansson, Pontus Johnson
ATAL
2011
Springer
12 years 10 months ago
Multi-criteria argument selection in persuasion dialogues
The main goal of a persuasion dialogue is to persuade, but agents may have a number of additional goals concerning the dialogue duration, how much and what information is shared o...
Thomas L. van der Weide, Frank Dignum, John-Jules ...
CAISE
2008
Springer
13 years 12 months ago
Validation of UML Conceptual Schemas with Operations
The purpose of validating a conceptual schema is to check whether it specifies what the designer intended. Our approach to validation consists in translating the schema into logic ...
Anna Queralt, Ernest Teniente