Sciweavers

3556 search results - page 555 / 712
» Can machine learning be secure
Sort
View
ECTEL
2006
Springer
14 years 2 months ago
Peer-to-peer Face-to-face Collaboration
In this paper, we present a proof of concept application of a technique that is designed explicitly for face to face collaboration software architectures. The objective is to minim...
Delfina Malandrino, Ilaria Manno
ICML
2010
IEEE
13 years 12 months ago
Inverse Optimal Control with Linearly-Solvable MDPs
We present new algorithms for inverse optimal control (or inverse reinforcement learning, IRL) within the framework of linearlysolvable MDPs (LMDPs). Unlike most prior IRL algorit...
Dvijotham Krishnamurthy, Emanuel Todorov
BMCBI
2008
138views more  BMCBI 2008»
13 years 11 months ago
Using neural networks and evolutionary information in decoy discrimination for protein tertiary structure prediction
Background: We present a novel method of protein fold decoy discrimination using machine learning, more specifically using neural networks. Here, decoy discrimination is represent...
Ching-Wai Tan, David T. Jones
ML
2010
ACM
127views Machine Learning» more  ML 2010»
13 years 9 months ago
Stability and model selection in k-means clustering
Abstract Clustering Stability methods are a family of widely used model selection techniques for data clustering. Their unifying theme is that an appropriate model should result in...
Ohad Shamir, Naftali Tishby
WSDM
2012
ACM
285views Data Mining» more  WSDM 2012»
12 years 6 months ago
Probabilistic models for personalizing web search
We present a new approach for personalizing Web search results to a specific user. Ranking functions for Web search engines are typically trained by machine learning algorithms u...
David Sontag, Kevyn Collins-Thompson, Paul N. Benn...