Sciweavers

3556 search results - page 578 / 712
» Can machine learning be secure
Sort
View
ML
2002
ACM
123views Machine Learning» more  ML 2002»
13 years 10 months ago
Feature Generation Using General Constructor Functions
Most classification algorithms receive as input a set of attributes of the classified objects. In many cases, however, the supplied set of attributes is not sufficient for creatin...
Shaul Markovitch, Dan Rosenstein
ICMLC
2010
Springer
13 years 9 months ago
An integrity-based fuzzy c-means method resolving cluster size sensitivity problem
: Cluster size insensitive FCM (csiFCM) dynamically adjusts the membership value of each object based on the size of the cluster to which it is assigned after defuzzification to re...
Y. H. Lai, P. W. Huang, P. L. Lin
ICML
2000
IEEE
14 years 11 months ago
Rates of Convergence for Variable Resolution Schemes in Optimal Control
This paper presents a general method to derive tight rates of convergence for numerical approximations in optimal control when we consider variable resolution grids. We study the ...
Andrew W. Moore, Rémi Munos
SIGMOD
2010
ACM
231views Database» more  SIGMOD 2010»
14 years 3 months ago
Automatically incorporating new sources in keyword search-based data integration
Scientific data offers some of the most interesting challenges in data integration today. Scientific fields evolve rapidly and accumulate masses of observational and experiment...
Partha Pratim Talukdar, Zachary G. Ives, Fernando ...
HUC
2009
Springer
14 years 3 months ago
ViridiScope: design and implementation of a fine grained power monitoring system for homes
A key prerequisite for residential energy conservation is knowing when and where energy is being spent. Unfortunately, the current generation of energy reporting devices only prov...
Younghun Kim, Thomas Schmid, Zainul Charbiwala, Ma...