Sciweavers

3556 search results - page 566 / 712
» Can machine learning be secure
Sort
View
ACL
2008
14 years 6 days ago
Extraction of Entailed Semantic Relations Through Syntax-Based Comma Resolution
This paper studies textual inference by investigating comma structures, which are highly frequent elements whose major role in the extraction of semantic relations has not been hi...
Vivek Srikumar, Roi Reichart, Mark Sammons, Ari Ra...
IADIS
2004
14 years 4 days ago
Relevance feedback using semantic association between indexing terms in large free text corpuses
Relevance feedback has been considered as a means of incorporating learning into information retrieval systems for quite sometime now. This paper discusses the research results of...
Shahzad Khan, Kenan Azam
NIPS
2004
14 years 3 days ago
The power of feature clustering: An application to object detection
We give a fast rejection scheme that is based on image segments and demonstrate it on the canonical example of face detection. However, instead of focusing on the detection step w...
Shai Avidan, Moshe Butman
SIGMOD
2010
ACM
224views Database» more  SIGMOD 2010»
13 years 11 months ago
GDR: a system for guided data repair
Improving data quality is a time-consuming, labor-intensive and often domain specific operation. Existing data repair approaches are either fully automated or not efficient in int...
Mohamed Yakout, Ahmed K. Elmagarmid, Jennifer Nevi...
ICANN
2010
Springer
13 years 11 months ago
Multi-Dimensional Deep Memory Atari-Go Players for Parameter Exploring Policy Gradients
Abstract. Developing superior artificial board-game players is a widelystudied area of Artificial Intelligence. Among the most challenging games is the Asian game of Go, which, des...
Mandy Grüttner, Frank Sehnke, Tom Schaul, J&u...