Sciweavers

1928 search results - page 305 / 386
» XML with incomplete information
Sort
View
SCN
2008
Springer
157views Communications» more  SCN 2008»
13 years 10 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
BMCBI
2005
114views more  BMCBI 2005»
13 years 10 months ago
Quality determination and the repair of poor quality spots in array experiments
Background: A common feature of microarray experiments is the occurence of missing gene expression data. These missing values occur for a variety of reasons, in particular, becaus...
Brian D. M. Tom, Walter R. Gilks, Elizabeth T. Bro...
AI
2004
Springer
13 years 10 months ago
Efficient learning equilibrium
Efficient Learning Equilibrium (ELE) is a natural solution concept for multi-agent encounters with incomplete information. It requires the learning algorithms themselves to be in ...
Ronen I. Brafman, Moshe Tennenholtz
KBS
2007
74views more  KBS 2007»
13 years 10 months ago
GUIDE: Games with UML for interactive design exploration
In this paper we present our design tool GUIDE, which allows the user to explore a design in UML interactively by playing a game. The game incorporates both the design model and a...
Jennifer Tenzer, Perdita Stevens
AI
2002
Springer
13 years 10 months ago
Learning cost-sensitive active classifiers
Most classification algorithms are "passive", in that they assign a class label to each instance based only on the description given, even if that description is incompl...
Russell Greiner, Adam J. Grove, Dan Roth