Sciweavers

3556 search results - page 122 / 712
» Can machine learning be secure
Sort
View
ICALT
2008
IEEE
14 years 4 months ago
A Pervasive Assessment System: Extending QTI to Incorporate Ad-hoc Wireless Sensors
Ad-hoc sensor networks provide a cheap and scalable technology for constructing pervasive learning assessment systems that are embedded in physical environments. This paper propos...
Imran A. Zualkernan, Ahmed Wasfy, Imad Zabalawi, M...
ICMLC
2010
Springer
13 years 8 months ago
Data mining model in analyzing portuguese studies as the second language acquisition
: Portuguese is specifically a difficult language with luxuriant tenses, and second language acquisition (SLA) is regarded as highly variable. Many (Chinese) students who learn Por...
Sam Chao, Fai Wong, CustoDio Cavaco Martins
NIPS
2000
13 years 11 months ago
Rate-coded Restricted Boltzmann Machines for Face Recognition
We describe a neurally-inspired, unsupervised learning algorithm that builds a non-linear generative model for pairs of face images from the same individual. Individuals are then ...
Yee Whye Teh, Geoffrey E. Hinton
EMNLP
2009
13 years 8 months ago
Synchronous Tree Adjoining Machine Translation
Tree Adjoining Grammars have well-known advantages, but are typically considered too difficult for practical systems. We demonstrate that, when done right, adjoining improves tran...
Steve DeNeefe, Kevin Knight
AGENTS
2000
Springer
14 years 2 months ago
Learning to Trust
Abstract. Evolutionary game-theory is a powerful tool to investigate the development of complex relations between individuals such as the emergence of cooperation and trust. But th...
Andreas Birk 0002