Sciweavers

40 search results - page 2 / 8
» Why and How to Perform Fraud Experiments
Sort
View
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
13 years 11 months ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...
NIPS
2000
13 years 8 months ago
A PAC-Bayesian Margin Bound for Linear Classifiers: Why SVMs work
We investigate how the normalization of vectors influences the result of SVMs. 1 Normalization For the theoretical background, please refer to [1]. 2 Experiments We empirically co...
Ralf Herbrich, Thore Graepel
CEC
2007
IEEE
14 years 1 months ago
How well do multi-objective evolutionary algorithms scale to large problems
Abstract— In spite of large amount of research work in multiobjective evolutionary algorithms, most have evaluated their algorithms on problems with only two to four objectives. ...
Kata Praditwong, Xin Yao
WSC
2001
13 years 9 months ago
Spreadsheet simulation
"Spreadsheet simulation" refers to the use of a spreadsheet as a platform for representing simulation models and performing simulation experiments. This tutorial explain...
Andrew F. Seila
CIDM
2009
IEEE
14 years 2 months ago
Diversity analysis on imbalanced data sets by using ensemble models
— Many real-world applications have problems when learning from imbalanced data sets, such as medical diagnosis, fraud detection, and text classification. Very few minority clas...
Shuo Wang, Xin Yao