Search
Now showing items 1-10 of 56
Novel document representations based on labels and sequential information
(Georgia Institute of Technology, 2015-07-23)
A wide variety of text analysis applications are based on statistical machine learning techniques. The success of those applications is critically affected by how we represent a document. Learning an efficient document ...
Representing and reasoning about videogame mechanics for automated design support
(Georgia Institute of Technology, 2015-05-14)
Videogame designers hope to sculpt gameplay, but actually work in the concrete medium of computation. What they create is code, artwork, dialogue---everything that goes inside a videogame cartridge. In other materially ...
Robots learning actions and goals from everyday people
(Georgia Institute of Technology, 2015-11-16)
Robots are destined to move beyond the caged factory floors towards domains where they will be interacting closely with humans. They will encounter highly varied environments, scenarios and user demands. As a result, ...
Influence modeling in behavioral data
(Georgia Institute of Technology, 2015-05-15)
Understanding influence in behavioral data has become increasingly important in analyzing the cause and effect of human behaviors under various scenarios. Influence modeling enables us to learn not only how human behaviors ...
Unsupervised learning of disease subtypes from continuous time Hidden Markov Models of disease progression
(Georgia Institute of Technology, 2015-08-21)
The detection of subtypes of complex diseases has important implications for diagnosis and treatment. Numerous prior studies have used data-driven approaches to identify clusters of similar patients, but it is not yet clear ...
Adaptive learning in lasso models
(Georgia Institute of Technology, 2015-08-20)
Regression with L1-regularization, Lasso, is a popular algorithm for recovering the sparsity pattern (also known as model selection) in linear models from observations contaminated by noise. We examine a scenario where a ...
Understanding DNS-based criminal infrastructure for informing takedowns
(Georgia Institute of Technology, 2015-08-18)
Botnets are a pervasive threat to the Internet and its inhabitants. A botnet
is a collection of infected machines that receive commands from the botmaster, a
person, group or nation- state, to perform malicious actions. ...
Design and evaluation of virtual network migration mechanisms on shared substrate
(Georgia Institute of Technology, 2015-11-13)
The Internet faces well-known challenges in realizing modifications to the core architecture. To help overcome these limitations, the use of network virtualization has been proposed. Network virtualization enables the ...
Simulating Human Motion for Object Manipulation
(Georgia Institute of Technology, 2015-11-12)
Performing object manipulation with full-body and dexterous hands is an essential human activity in everyday environment. Although problems involving object manipulation have been frequently studied by researchers in ...
Mitigating the performance impact of memory bloat
(Georgia Institute of Technology, 2015-08-21)
Memory bloat is loosely defined as an excessive memory usage by an application during its execution. Due to the complexity of efficient memory management that developers have to deal with, memory bloat is pervasive and is ...