Sciweavers

3556 search results - page 54 / 712
» Can machine learning be secure
Sort
View
APBC
2003
116views Bioinformatics» more  APBC 2003»
13 years 11 months ago
An Empirical Comparison of Supervised Machine Learning Techniques in Bioinformatics
Research in bioinformatics is driven by the experimental data. Current biological databases are populated by vast amounts of experimental data. Machine learning has been widely ap...
Aik Choon Tan, David Gilbert
ITC
1997
IEEE
129views Hardware» more  ITC 1997»
14 years 2 months ago
On Using Machine Learning for Logic BIST
This paper presents a new approach for designing test sequences to be generated on–chip. The proposed technique is based on machine learning, and provides a way to generate effi...
Christophe Fagot, Patrick Girard, Christian Landra...
LREC
2010
119views Education» more  LREC 2010»
13 years 11 months ago
Predicting Morphological Types of Chinese Bi-Character Words by Machine Learning Approaches
This paper presented an overview of Chinese bi-character words' morphological types, and proposed a set of features for machine learning approaches to predict these types bas...
Ting-Hao Huang, Lun-Wei Ku, Hsin-Hsi Chen
SDM
2012
SIAM
237views Data Mining» more  SDM 2012»
12 years 14 days ago
A Distributed Kernel Summation Framework for General-Dimension Machine Learning
Kernel summations are a ubiquitous key computational bottleneck in many data analysis methods. In this paper, we attempt to marry, for the first time, the best relevant technique...
Dongryeol Lee, Richard W. Vuduc, Alexander G. Gray
IUI
2009
ACM
14 years 7 months ago
Fixing the program my computer learned: barriers for end users, challenges for the machine
The results of a machine learning from user behavior can be thought of as a program, and like all programs, it may need to be debugged. Providing ways for the user to debug it mat...
Todd Kulesza, Weng-Keen Wong, Simone Stumpf, Steph...