Sciweavers

3556 search results - page 608 / 712
» Can machine learning be secure
Sort
View
NIPS
2007
13 years 11 months ago
Expectation Maximization and Posterior Constraints
The expectation maximization (EM) algorithm is a widely used maximum likelihood estimation procedure for statistical models when the values of some of the variables in the model a...
João Graça, Kuzman Ganchev, Ben Task...
FLAIRS
2001
13 years 11 months ago
Facilitating the Exchange of Explicit Knowledge through Ontology Mappings
In this paper, we give an overview of a system (CAIMAN) that can facilitate the exchange of relevant documents between geographically dispersed people in Communities of Interest. ...
Martin S. Lacher, Georg Groh
IAAI
2003
13 years 11 months ago
Searching for Hidden Messages: Automatic Detection of Steganography
Steganography is the field of hiding messages in apparently innocuous media (e.g. images), and steganalysis is the field of detecting these covert messages. Almost all steganalysi...
George Berg, Ian Davidson, Ming-Yuan Duan, Goutam ...
NIPS
2001
13 years 11 months ago
Fast and Robust Classification using Asymmetric AdaBoost and a Detector Cascade
This paper develops a new approach for extremely fast detection in domains where the distribution of positive and negative examples is highly skewed (e.g. face detection or databa...
Paul A. Viola, Michael J. Jones
AAAI
1998
13 years 11 months ago
Eye Finding via Face Detection for a Foveated Active Vision System
Eye finding is the first step toward building a machine that can recognize social cues, like eye contact and gaze direction, in a natural context. In this paper, we present a real...
Brian Scassellati