Sciweavers

3556 search results - page 623 / 712
» Can machine learning be secure
Sort
View
LREC
2010
154views Education» more  LREC 2010»
13 years 11 months ago
CCASH: A Web Application Framework for Efficient, Distributed Language Resource Development
We introduce CCASH (Cost-Conscious Annotation Supervised by Humans), an extensible web application framework for cost-efficient annotation. CCASH provides a framework in which cos...
Paul Felt, Owen Merkling, Marc Carmen, Eric K. Rin...
CVPR
2007
IEEE
15 years 9 days ago
Using Group Prior to Identify People in Consumer Images
While face recognition techniques have rapidly advanced in the last few years, most of the work is in the domain of security applications. For consumer imaging applications, perso...
Andrew C. Gallagher, Tsuhan Chen
KDD
2004
ACM
154views Data Mining» more  KDD 2004»
14 years 10 months ago
Diagnosing extrapolation: tree-based density estimation
There has historically been very little concern with extrapolation in Machine Learning, yet extrapolation can be critical to diagnose. Predictor functions are almost always learne...
Giles Hooker
BMCBI
2007
178views more  BMCBI 2007»
13 years 10 months ago
SVM clustering
Background: Support Vector Machines (SVMs) provide a powerful method for classification (supervised learning). Use of SVMs for clustering (unsupervised learning) is now being cons...
Stephen Winters-Hilt, Sam Merat
WWW
2009
ACM
14 years 11 months ago
Automated construction of web accessibility models from transaction click-streams
Screen readers, the dominant assistive technology used by visually impaired people to access the Web, function by speaking out the content of the screen serially. Using screen rea...
Jalal Mahmud, Yevgen Borodin, I. V. Ramakrishnan, ...