Sciweavers

3556 search results - page 613 / 712
» Can machine learning be secure
Sort
View
SIGKDD
2010
151views more  SIGKDD 2010»
13 years 5 months ago
Limitations of matrix completion via trace norm minimization
In recent years, compressive sensing attracts intensive attentions in the field of statistics, automatic control, data mining and machine learning. It assumes the sparsity of the ...
Xiaoxiao Shi, Philip S. Yu
ATAL
2011
Springer
12 years 10 months ago
Online anomaly detection in unmanned vehicles
Autonomy requires robustness. The use of unmanned (autonomous) vehicles is appealing for tasks which are dangerous or dull. However, increased reliance on autonomous robots increa...
Eliahu Khalastchi, Gal A. Kaminka, Meir Kalech, Ra...
JMLR
2012
12 years 23 days ago
Low rank continuous-space graphical models
Constructing tractable dependent probability distributions over structured continuous random vectors is a central problem in statistics and machine learning. It has proven diffic...
Carl Smith, Frank Wood, Liam Paninski
SIGMOD
2007
ACM
161views Database» more  SIGMOD 2007»
14 years 10 months ago
Homeviews: peer-to-peer middleware for personal data sharing applications
This paper presents HomeViews, a peer-to-peer middleware system for building personal data management applications. HomeViews provides abstractions and services for data organizat...
Roxana Geambasu, Magdalena Balazinska, Steven D. G...
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
14 years 5 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...