Sciweavers

3556 search results - page 14 / 712
» Can machine learning be secure
Sort
View
DSRT
2008
IEEE
14 years 2 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
AAAI
2008
13 years 10 months ago
A Case Study on the Critical Role of Geometric Regularity in Machine Learning
An important feature of many problem domains in machine learning is their geometry. For example, adjacency relationships, symmetries, and Cartesian coordinates are essential to an...
Jason Gauci, Kenneth O. Stanley
NIPS
1997
13 years 9 months ago
Reinforcement Learning with Hierarchies of Machines
We present a new approach to reinforcement learning in which the policies considered by the learning process are constrained by hierarchies of partially specified machines. This ...
Ronald Parr, Stuart J. Russell
WWW
2008
ACM
14 years 8 months ago
Can chinese web pages be classified with english data source?
As the World Wide Web in China grows rapidly, mining knowledge in Chinese Web pages becomes more and more important. Mining Web information usually relies on the machine learning ...
Xiao Ling, Gui-Rong Xue, Wenyuan Dai, Yun Jiang, Q...
ECML
1998
Springer
13 years 12 months ago
Learning to Classify X-Ray Images Using Relational Learning
: Image understanding often requires extensive background knowledge. The problem addressed in this paper is such knowledge can be acquired. We discuss how relational machine learni...
Claude Sammut, Tatjana Zrimec