Sciweavers

3556 search results - page 575 / 712
» Can machine learning be secure
Sort
View
CHI
1998
ACM
14 years 2 months ago
Beyond Paper: Supporting Active Reading with Free Form Digital Ink Annotations
Reading frequently involves not just looking at words on a page, but also underlining, highlighting and commenting, either on the text or in a separate notebook. This combination ...
Bill N. Schilit, Gene Golovchinsky, Morgan N. Pric...
CP
2006
Springer
14 years 2 months ago
Performance Prediction and Automated Tuning of Randomized and Parametric Algorithms
Abstract. Machine learning can be utilized to build models that predict the runtime of search algorithms for hard combinatorial problems. Such empirical hardness models have previo...
Frank Hutter, Youssef Hamadi, Holger H. Hoos, Kevi...
IJCAI
2007
14 years 2 days ago
Explanation-Based Feature Construction
Choosing good features to represent objects can be crucial to the success of supervised machine learning algorithms. Good high-level features are those that concentrate informatio...
Shiau Hong Lim, Li-Lun Wang, Gerald DeJong
NIPS
2004
14 years 20 hour ago
Maximum Margin Clustering
We propose a new method for clustering based on finding maximum margin hyperplanes through data. By reformulating the problem in terms of the implied equivalence relation matrix, ...
Linli Xu, James Neufeld, Bryce Larson, Dale Schuur...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 10 months ago
Efficient Minimization of Decomposable Submodular Functions
Many combinatorial problems arising in machine learning can be reduced to the problem of minimizing a submodular function. Submodular functions are a natural discrete analog of co...
Peter Stobbe, Andreas Krause