Sciweavers

3556 search results - page 611 / 712
» Can machine learning be secure
Sort
View
ECAI
2010
Springer
13 years 8 months ago
Describing the Result of a Classifier to the End-User: Geometric-based Sensitivity
This paper addresses the issue of supporting the end-user of a classifier, when it is used as a decision support system, to classify new cases. We consider several kinds of classif...
Isabelle Alvarez, Sophie Martin, Salma Mesmoudi
GIS
2010
ACM
13 years 8 months ago
Kernelized map matching
Map matching is a fundamental operation in many applications such as traffic analysis and location-aware services, the killer apps for ubiquitous computing. In the past, several m...
Ahmed Jawad, Kristian Kersting
SIGSOFT
2010
ACM
13 years 8 months ago
Software is data too
Software systems are designed and engineered to process data. However, software is data too. The size and variety of today's software artifacts and the multitude of stakehold...
Andrian Marcus, Tim Menzies
DIS
2009
Springer
13 years 8 months ago
Player Modeling for Intelligent Difficulty Adjustment
In this paper we aim at automatically adjusting the difficulty of computer games by clustering players into different types and supervised prediction of the type from short traces ...
Olana Missura, Thomas Gärtner
FECS
2009
164views Education» more  FECS 2009»
13 years 8 months ago
Development of a System for Teaching C/C++ Using Robots and Open Source Software in a CS1 Course
- This paper describes the development of a system for teaching C/C++ using LegoTM RCX Robots in a CS1 college course on introductory programming. The system has been implemented u...
Amy Delman, Lawrence Goetz, Yedidyah Langsam, Theo...