Sciweavers

2050 search results - page 171 / 410
» constraints 2010
Sort
View
JMLR
2010
198views more  JMLR 2010»
13 years 5 months ago
Online Anomaly Detection under Adversarial Impact
Security analysis of learning algorithms is gaining increasing importance, especially since they have become target of deliberate obstruction in certain applications. Some securit...
Marius Kloft, Pavel Laskov
JMLR
2010
119views more  JMLR 2010»
13 years 5 months ago
Semi-Supervised Learning via Generalized Maximum Entropy
Various supervised inference methods can be analyzed as convex duals of the generalized maximum entropy (MaxEnt) framework. Generalized MaxEnt aims to find a distribution that max...
Ayse Erkan, Yasemin Altun
JMLR
2010
159views more  JMLR 2010»
13 years 5 months ago
Inference of Sparse Networks with Unobserved Variables. Application to Gene Regulatory Networks
Networks are becoming a unifying framework for modeling complex systems and network inference problems are frequently encountered in many fields. Here, I develop and apply a gener...
Nikolai Slavov
JSAC
2010
116views more  JSAC 2010»
13 years 5 months ago
Utility-based asynchronous flow control algorithm for wireless sensor networks
Abstract--In this paper, we formulate a flow control optimization problem for wireless sensor networks with lifetime constraint and link interference in an asynchronous setting. Ou...
Jiming Chen, WeiQiang Xu, Shibo He, Youxian Sun, P...
JUCS
2010
152views more  JUCS 2010»
13 years 5 months ago
Verification of Structural Pattern Conformance Using Logic Programming
: This paper formalizes UML class diagrams and structural patterns as mathematical objects and provides a precise notion of conformance of a structural model specified as a class d...
Lunjin Lu, Dae-Kyoo Kim, Yuanlin Zhu, Sangsig Kim