Sciweavers

3556 search results - page 173 / 712
» Can machine learning be secure
Sort
View
COLT
2008
Springer
14 years 18 days ago
Polynomial Regression under Arbitrary Product Distributions
In recent work, Kalai, Klivans, Mansour, and Servedio [KKMS05] studied a variant of the "Low-Degree (Fourier) Algorithm" for learning under the uniform probability distr...
Eric Blais, Ryan O'Donnell, Karl Wimmer
ECTEL
2008
Springer
14 years 17 days ago
Towards Accessing Disparate Educational Data in a Single, Unified Manner
Abstract. Educational researchers need to exchange and compare their learnerinteraction data in order to benefit the learning science community as a whole. In order to support this...
Erica Melis, Bruce M. McLaren, Silvana Solomon
ML
2006
ACM
105views Machine Learning» more  ML 2006»
13 years 10 months ago
Propositionalization-based relational subgroup discovery with RSD
Abstract Relational rule learning algorithms are typically designed to construct classification and prediction rules. However, relational rule learning can be adapted also to subgr...
Filip Zelezný, Nada Lavrac
ML
2002
ACM
100views Machine Learning» more  ML 2002»
13 years 10 months ago
Structure in the Space of Value Functions
Solving in an efficient manner many different optimal control tasks within the same underlying environment requires decomposing the environment into its computationally elemental ...
David J. Foster, Peter Dayan
SIGOPSE
1998
ACM
14 years 3 months ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...