Sciweavers

3556 search results - page 565 / 712
» Can machine learning be secure
Sort
View
AUSDM
2006
Springer
112views Data Mining» more  AUSDM 2006»
14 years 2 months ago
Accuracy Estimation With Clustered Dataset
If the dataset available to machine learning results from cluster sampling (e.g. patients from a sample of hospital wards), the usual cross-validation error rate estimate can lead...
Ricco Rakotomalala, Jean-Hugues Chauchat, Fran&cce...
COMPLIFE
2006
Springer
14 years 2 months ago
Relational Subgroup Discovery for Descriptive Analysis of Microarray Data
Abstract. This paper presents a method that uses gene ontologies, together with the paradigm of relational subgroup discovery, to help find description of groups of genes different...
Igor Trajkovski, Filip Zelezný, Jakub Tolar...
GECCO
2006
Springer
186views Optimization» more  GECCO 2006»
14 years 2 months ago
Genetic algorithms for action set selection across domains: a demonstration
Action set selection in Markov Decision Processes (MDPs) is an area of research that has received little attention. On the other hand, the set of actions available to an MDP agent...
Greg Lee, Vadim Bulitko
GECCO
2006
Springer
179views Optimization» more  GECCO 2006»
14 years 2 months ago
Evolving cooperative behavior in a power market
This paper presents an evolutionary algorithm to develop cooperative strategies for power buyers in a deregulated electrical power market. Cooperative strategies are evolved throu...
Dipti Srinivasan, Dakun Woo, Lily Rachmawati, Kong...
AIIDE
2008
14 years 1 months ago
Adaptive Spatial Reasoning for Turn-based Strategy Games
The quality of AI opponents often leaves a lot to be desired, which poses many attractive challenges for AI researchers. In this respect, Turn-based Strategy (TBS) games are of pa...
Maurice H. J. Bergsma, Pieter Spronck