Sciweavers

3556 search results - page 109 / 712
» Can machine learning be secure
Sort
View
ICALT
2006
IEEE
14 years 4 months ago
Trace Analysis in Instrumented Collaborative Learning Environments
Observation activity, on instrumented collective learning situations, enables participants to appropriate themselves corresponding systems in their own practice. In this paper, we...
Christophe Courtin, Stephane Talbot
ICALT
2006
IEEE
14 years 4 months ago
A Descriptive Markup Approach to Facilitate the Production of e-Learning Contents
1 In this paper we show how descriptive markup technologies can help teachers in the production of learning content that later could be used for many different purposes with differ...
Pablo Moreno-Ger, Iván Martínez-Orti...
ECML
2006
Springer
14 years 2 months ago
Graph Based Semi-supervised Learning with Sharper Edges
In many graph-based semi-supervised learning algorithms, edge weights are assumed to be fixed and determined by the data points' (often symmetric) relationships in input space...
Hyunjung Shin, N. Jeremy Hill, Gunnar Rätsch
APIN
1999
107views more  APIN 1999»
13 years 10 months ago
Massively Parallel Probabilistic Reasoning with Boltzmann Machines
We present a method for mapping a given Bayesian network to a Boltzmann machine architecture, in the sense that the the updating process of the resulting Boltzmann machine model pr...
Petri Myllymäki
RAID
2007
Springer
14 years 4 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...