Sciweavers

3556 search results - page 154 / 712
» Can machine learning be secure
Sort
View
ICML
2008
IEEE
14 years 11 months ago
An analysis of linear models, linear value-function approximation, and feature selection for reinforcement learning
We show that linear value-function approximation is equivalent to a form of linear model approximation. We then derive a relationship between the model-approximation error and the...
Ronald Parr, Lihong Li, Gavin Taylor, Christopher ...
ICML
2003
IEEE
14 years 11 months ago
Adaptive Feature-Space Conformal Transformation for Imbalanced-Data Learning
When the training instances of the target class are heavily outnumbered by non-target training instances, SVMs can be ineffective in determining the class boundary. To remedy this...
Gang Wu, Edward Y. Chang
ECML
2000
Springer
14 years 3 months ago
Learning Context-Free Grammars with a Simplicity Bias
We examine the role of simplicity in directing the induction of context-free grammars from sample sentences. We present a rational reconstruction of Wol 's SNPR { the Gridssys...
Pat Langley, Sean Stromsten
ML
2006
ACM
110views Machine Learning» more  ML 2006»
13 years 10 months ago
Distribution-based aggregation for relational learning with identifier attributes
Abstract Identifier attributes--very high-dimensional categorical attributes such as particular product ids or people's names--rarely are incorporated in statistical modeling....
Claudia Perlich, Foster J. Provost
CORR
2011
Springer
222views Education» more  CORR 2011»
13 years 2 months ago
Weakly Supervised Learning of Foreground-Background Segmentation using Masked RBMs
Abstract. We propose an extension of the Restricted Boltzmann Machine (RBM) that allows the joint shape and appearance of foreground objects in cluttered images to be modeled indep...
Nicolas Heess, Nicolas Le Roux, John M. Winn