Sciweavers

3556 search results - page 593 / 712
» Can machine learning be secure
Sort
View
MLDM
2007
Springer
14 years 4 months ago
A Novel Rule Ordering Approach in Classification Association Rule Mining
A Classification Association Rule (CAR), a common type of mined knowledge in Data Mining, describes an implicative co-occurring relationship between a set of binary-valued data-att...
Yanbo J. Wang, Qin Xin, Frans Coenen
ICALT
2005
IEEE
14 years 4 months ago
Empirical Validation of Concept Maps: Preliminary Methodological Considerations
For their usage in the semantic web, valid ontologies are required for a given domain. Here we focus on ontologies represented as concept maps (semantic nets). For one and the sam...
Dietrich Albert, Christina M. Steiner
COLT
2008
Springer
14 years 5 days ago
Almost Tight Upper Bound for Finding Fourier Coefficients of Bounded Pseudo- Boolean Functions
A pseudo-Boolean function is a real-valued function defined on {0, 1}n . A k-bounded function is a pseudo-Boolean function that can be expressed as a sum of subfunctions each of w...
Sung-Soon Choi, Kyomin Jung, Jeong Han Kim
ML
2006
ACM
13 years 10 months ago
Universal parameter optimisation in games based on SPSA
Most game programs have a large number of parameters that are crucial for their performance. While tuning these parameters by hand is rather difficult, efficient and easy to use ge...
Levente Kocsis, Csaba Szepesvári
ICCV
2009
IEEE
15 years 3 months ago
Efficient subset selection based on the Renyi entropy
Many machine learning algorithms require the summation of Gaussian kernel functions, an expensive operation if implemented straightforwardly. Several methods have been proposed t...
Vlad I. Morariu1, Balaji V. Srinivasan, Vikas C. R...