Sciweavers

3556 search results - page 113 / 712
» Can machine learning be secure
Sort
View
ECTEL
2006
Springer
14 years 2 months ago
An Exploratory Study of the Relationship Between Learning Styles and Cognitive Traits
To provide personalization and adaptivity in technology enhanced learning systems, the needs of learners have to be known by the system first. Detecting these needs is a challengin...
Sabine Graf, Taiyu Lin, Lynn Jeffrey, Kinshuk
ICML
1995
IEEE
14 years 1 months ago
Learning Collection FUsion Strategies for Information Retrieval
In this paper we describe an Information Retrieval problem called collection fusion. The collection fusion problem is to maximize the number of relevant natural language documents...
Geoffrey G. Towell, Ellen M. Voorhees, Narendra Ku...
ML
2011
ACM
179views Machine Learning» more  ML 2011»
13 years 5 months ago
Neural networks for relational learning: an experimental comparison
In the last decade, connectionist models have been proposed that can process structured information directly. These methods, which are based on the use of graphs for the representa...
Werner Uwents, Gabriele Monfardini, Hendrik Blocke...
ACSAC
2005
IEEE
14 years 4 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
ICRA
2006
IEEE
100views Robotics» more  ICRA 2006»
14 years 4 months ago
Learning EMG Control of a Robotic Hand: Towards Active Prostheses
— We introduce a method based on support vector machines which can detect opening and closing actions of the human thumb, index finger, and other fingers recorded via surface E...
Sebastian Bitzer, P. Patrick van der Smagt