Sciweavers

3556 search results - page 60 / 712
» Can machine learning be secure
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
Improving kernel-energy trade-offs for machine learning in implantable and wearable biomedical applications
Emerging biomedical sensors and stimulators offer unprecedented modalities for delivering therapy and acquiring physiological signals (e.g., deep brain stimulators). Exploiting th...
Kyong-Ho Lee, Sun-Yuan Kung, Naveen Verma
ICCV
2003
IEEE
15 years 6 hour ago
Machine Learning and Multiscale Methods in the Identification of Bivalve Larvae
This paper describes a novel application of support vector machines and multiscale texture and color invariants to a problem in biological oceanography: the identification of 6 sp...
Sanjay Tiwari, Scott Gallager
VL
2010
IEEE
216views Visual Languages» more  VL 2010»
13 years 8 months ago
Explanatory Debugging: Supporting End-User Debugging of Machine-Learned Programs
Many machine-learning algorithms learn rules of behavior from individual end users, such as taskoriented desktop organizers and handwriting recognizers. These rules form a “prog...
Todd Kulesza, Simone Stumpf, Margaret M. Burnett, ...
ICMLA
2007
13 years 11 months ago
SVMotif: A Machine Learning Motif Algorithm
We describe SVMotif, a support vector machine-based learning algorithm for identification of cellular DNA transcription factor (TF) motifs extrapolated from known TF-gene interact...
Mark A. Kon, Yue Fan, Dustin T. Holloway, Charles ...
JMLR
2002
90views more  JMLR 2002»
13 years 9 months ago
Machine Learning with Data Dependent Hypothesis Classes
We extend the VC theory of statistical learning to data dependent spaces of classifiers. This theory can be viewed as a decomposition of classifier design into two components; the...
Adam Cannon, J. Mark Ettinger, Don R. Hush, Clint ...