Sciweavers

3556 search results - page 607 / 712
» Can machine learning be secure
Sort
View
UM
2010
Springer
14 years 2 months ago
Interaction and Personalization of Criteria in Recommender Systems
A user’s informational need and preferences can be modeled by criteria, which in turn can be used to prioritize candidate results and produce a ranked list. We examine the use of...
Shawn R. Wolfe, Yi Zhang
CIVR
2004
Springer
248views Image Analysis» more  CIVR 2004»
14 years 2 months ago
Automated Person Identification in Video
Abstract. We describe progress in the automatic detection and identification of humans in video, given a minimal number of labelled faces as training data. This is an extremely cha...
Mark Everingham, Andrew Zisserman
GECCO
2006
Springer
173views Optimization» more  GECCO 2006»
14 years 2 months ago
Sets of receiver operating characteristic curves and their use in the evaluation of multi-class classification
Within the last two decades, Receiver Operating Characteristic (ROC) Curves have become a standard tool for the analysis and comparison of classifiers since they provide a conveni...
Stephan M. Winkler, Michael Affenzeller, Stefan Wa...
ACL
2007
13 years 11 months ago
Multilingual Transliteration Using Feature based Phonetic Method
In this paper we investigate named entity transliteration based on a phonetic scoring method. The phonetic method is computed using phonetic features and carefully designed pseudo...
Su-Youn Yoon, Kyoung-Young Kim, Richard Sproat
NAACL
2007
13 years 11 months ago
Unsupervised Natural Language Processing Using Graph Models
In the past, NLP has always been based on the explicit or implicit use of linguistic knowledge. In classical computer linguistic applications explicit rule based approaches prevai...
Chris Biemann