Sciweavers

AAAI
2015
8 years 8 months ago
Optimal Personalized Filtering Against Spear-Phishing Attacks
To penetrate sensitive computer networks, attackers can use spear phishing to sidestep technical security mechanisms by exploiting the privileges of careless users. In order to ma...
Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Kout...
AAAI
2015
8 years 8 months ago
Security Games with Protection Externalities
Stackelberg security games have been widely deployed in recent years to schedule security resources. An assumption in most existing security game models is that one security resou...
Jiarui Gan, Bo An, Yevgeniy Vorobeychik
AAAI
2015
8 years 8 months ago
Maestoso: An Intelligent Educational Sketching Tool for Learning Music Theory
Learning music theory not only has practical benefits for musicians to write, perform, understand, and express music better, but also for both non-musicians to improve critical t...
Paul Taele, Laura Barreto, Tracy Anne Hammond
AAAI
2015
8 years 8 months ago
Identifying At-Risk Students in Massive Open Online Courses
Massive Open Online Courses (MOOCs) have received widespread attention for their potential to scale higher education, with multiple platforms such as Coursera, edX and Udacity rec...
Jiazhen He, James Bailey, Benjamin I. P. Rubinstei...
AAAI
2015
8 years 8 months ago
Leveraging Features and Networks for Probabilistic Tensor Decomposition
We present a probabilistic model for tensor decomposition where one or more tensor modes may have sideinformation about the mode entities in form of their features and/or their ad...
Piyush Rai, Yingjian Wang, Lawrence Carin
AAAI
2015
8 years 8 months ago
XPath for DL Ontologies
Applications of description logics (DLs) such as OWL 2 and ontology-based data access (OBDA) require understanding of how to pose database queries over DL knowledge bases. While t...
Egor V. Kostylev, Juan L. Reutter, Domagoj Vrgoc
AAAI
2015
8 years 8 months ago
Towards Tractable and Practical ABox Abduction over Inconsistent Description Logic Ontologies
ABox abduction plays an important role in reasoning over description logic (DL) ontologies. However, it does not work with inconsistent DL ontologies. To tackle this problem while...
Jianfeng Du, Kewen Wang, Yi-Dong Shen
AAAI
2015
8 years 8 months ago
Large-Scale Multi-View Spectral Clustering via Bipartite Graph
In this paper, we address the problem of large-scale multi-view spectral clustering. In many real-world applications, data can be represented in various heterogeneous features or ...
Yeqing Li, Feiping Nie, Heng Huang, Junzhou Huang
AAAI
2015
8 years 8 months ago
Cupid: Commitments in Relational Algebra
We propose Cupid, a language for specifying commitments that supports their information-centric aspects, and offers crucial benefits. One, Cupid is first-order, enabling a syste...
Amit K. Chopra, Munindar P. Singh
AAAI
2015
8 years 8 months ago
Learning Relational Kalman Filtering
The Kalman Filter (KF) is pervasively used to control a vast array of consumer, health and defense products. By grouping sets of symmetric state variables, the Relational Kalman F...
Jaesik Choi, Eyal Amir, Tianfang Xu, Albert J. Val...