Sciweavers

3556 search results - page 571 / 712
» Can machine learning be secure
Sort
View
ICASSP
2011
IEEE
13 years 2 months ago
Application specific loss minimization using gradient boosting
Gradient boosting is a flexible machine learning technique that produces accurate predictions by combining many weak learners. In this work, we investigate its use in two applica...
Bin Zhang, Abhinav Sethy, Tara N. Sainath, Bhuvana...
AGENTS
2000
Springer
14 years 3 months ago
Towards a fault-tolerant multi-agent system architecture
Multi-agent systems are prone to failures typical of any distributed system. Agents and resources may become unavailable due to machine crashes, communication breakdowns, process ...
Sanjeev Kumar, Philip R. Cohen
OOPSLA
2010
Springer
13 years 9 months ago
Hera-JVM: a runtime system for heterogeneous multi-core architectures
Heterogeneous multi-core processors, such as the IBM Cell processor, can deliver high performance. However, these processors are notoriously difficult to program: different cores...
Ross McIlroy, Joe Sventek
AINA
2004
IEEE
14 years 2 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
RECOMB
2007
Springer
14 years 11 months ago
A Bayesian Model That Links Microarray mRNA Measurements to Mass Spectrometry Protein Measurements
Abstract. An important problem in biology is to understand correspondences between mRNA microarray levels and mass spectrometry peptide counts. Recently, a compendium of mRNA expre...
Anitha Kannan, Andrew Emili, Brendan J. Frey