Sciweavers

3556 search results - page 62 / 712
» Can machine learning be secure
Sort
View
NLPRS
2001
Springer
14 years 2 months ago
Named Entity Recognition using Machine Learning Methods and Pattern-Selection Rules
Named Entity recognition, as a task of providing important semantic information, is a critical first step in Information Extraction and QuestionAnswering system. This paper propos...
Choong-Nyoung Seon, Youngjoong Ko, Jeong-Seok Kim,...
ACL
2006
13 years 11 months ago
Using Machine-Learning to Assign Function Labels to Parser Output for Spanish
Data-driven grammatical function tag assignment has been studied for English using the Penn-II Treebank data. In this paper we address the question of whether such methods can be ...
Grzegorz Chrupala, Josef van Genabith
DATAMINE
2006
139views more  DATAMINE 2006»
13 years 10 months ago
VizRank: Data Visualization Guided by Machine Learning
Data visualization plays a crucial role in identifying interesting patterns in exploratory data analysis. Its use is, however, made difficult by the large number of possible data p...
Gregor Leban, Blaz Zupan, Gaj Vidmar, Ivan Bratko
JMLR
2010
143views more  JMLR 2010»
13 years 8 months ago
A Quasi-Newton Approach to Nonsmooth Convex Optimization Problems in Machine Learning
We extend the well-known BFGS quasi-Newton method and its memory-limited variant LBFGS to the optimization of nonsmooth convex objectives. This is done in a rigorous fashion by ge...
Jin Yu, S. V. N. Vishwanathan, Simon Günter, ...
ACSAC
2006
IEEE
14 years 4 months ago
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy
In this paper we examine the problem of entering sensitive data, such as passwords, from an untrusted machine. By untrusted we mean that it is suspected to be infected with spywar...
Dinei A. F. Florêncio, Cormac Herley