Sciweavers

CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 11 months ago
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Resea...
Julie Greensmith, Uwe Aickelin, Gianni Tedesco
CORR
2010
Springer
68views Education» more  CORR 2010»
13 years 11 months ago
On Probabilistic Alternating Simulations
Abstract. This paper presents simulation-based relations for probabilistic game structures. The first relation is called probabilistic alternating simulation, and the second called...
Chenyi Zhang, Jun Pang
CORR
2010
Springer
118views Education» more  CORR 2010»
13 years 11 months ago
Automatically Discovering Hidden Transformation Chaining Constraints
Abstract. Model transformations operate on models conforming to precisely defined metamodels. Consequently, it often seems relatively easy to chain them: the output of a transforma...
Raphaël Chenouard, Frédéric Jou...
CORR
2010
Springer
73views Education» more  CORR 2010»
13 years 11 months ago
Exponential Family Hybrid Semi-Supervised Learning
We present an approach to semi-supervised learning based on an exponential family characterization. Our approach generalizes previous work on coupled priors for hybrid generative/...
Arvind Agarwal, Hal Daumé III
CORR
2010
Springer
127views Education» more  CORR 2010»
13 years 11 months ago
Statistical and Computational Tradeoffs in Stochastic Composite Likelihood
Maximum likelihood estimators are often of limited practical use due to the intensive computation they require. We propose a family of alternative estimators that maximize a stoch...
Joshua Dillon, Guy Lebanon
CORR
2010
Springer
98views Education» more  CORR 2010»
13 years 11 months ago
Strategical languages of infinite words
: We deal in this paper with strategical languages of infinite words, that is those generated by a nondeterministic strategy in the sense of game theory. We first show the existenc...
Mustapha Arfi, Bedine Ould M. Lemine, Carla Selmi
CORR
2010
Springer
97views Education» more  CORR 2010»
13 years 11 months ago
The finite-dimensional Witsenhausen counterexample
Recently, a vector version of Witsenhausen's counterexample was considered and it was shown that in that limit of infinite vector length, certain quantization-based strategie...
Pulkit Grover, Se Yong Park, Anant Sahai
CORR
2010
Springer
207views Education» more  CORR 2010»
13 years 11 months ago
Collaborative Hierarchical Sparse Modeling
Sparse modeling is a powerful framework for data analysis and processing. Traditionally, encoding in this framework is performed by solving an 1-regularized linear regression prob...
Pablo Sprechmann, Ignacio Ramírez, Guillerm...
CORR
2010
Springer
88views Education» more  CORR 2010»
13 years 11 months ago
libtissue - implementing innate immunity
In a previous paper the authors argued the case for incorporating ideas from innate immunity into artificial immune systems (AISs) and presented an outline for a conceptual framewo...
Jamie Twycross, Uwe Aickelin
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 11 months ago
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
Abstract. As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application...
Feng Gu, Julie Greensmith, Uwe Aickelin