Sciweavers

3556 search results - page 637 / 712
» Can machine learning be secure
Sort
View
ECML
2005
Springer
14 years 3 months ago
U-Likelihood and U-Updating Algorithms: Statistical Inference in Latent Variable Models
Abstract. In this paper we consider latent variable models and introduce a new U-likelihood concept for estimating the distribution over hidden variables. One can derive an estimat...
JaeMo Sung, Sung Yang Bang, Seungjin Choi, Zoubin ...
IJCNLP
2005
Springer
14 years 3 months ago
Automatic Extraction of Fixed Multiword Expressions
Abstract. Fixed multiword expressions are strings of words which together behave like a single word. This research establishes a method for the automatic extraction of such express...
Campbell Hore, Masayuki Asahara, Yuji Matsumoto
LAMAS
2005
Springer
14 years 3 months ago
The Success and Failure of Tag-Mediated Evolution of Cooperation
Use of tags to limit partner selection for playing has been shown to produce stable cooperation in agent populations playing the Prisoner’s Dilemma game. There is, however, a lac...
Austin McDonald, Sandip Sen
PKDD
2005
Springer
125views Data Mining» more  PKDD 2005»
14 years 3 months ago
A Propositional Approach to Textual Case Indexing
Abstract. Problem solving with experiences that are recorded in text form requires a mapping from text to structured cases, so that case comparison can provide informed feedback fo...
Nirmalie Wiratunga, Robert Lothian, Sutanu Chakrab...
RSFDGRC
2005
Springer
190views Data Mining» more  RSFDGRC 2005»
14 years 3 months ago
Finding Rough Set Reducts with SAT
Abstract. Feature selection refers to the problem of selecting those input features that are most predictive of a given outcome; a problem encountered in many areas such as machine...
Richard Jensen, Qiang Shen, Andrew Tuson