Sciweavers

3556 search results - page 638 / 712
» Can machine learning be secure
Sort
View
TSD
2005
Springer
14 years 3 months ago
Experimental Evaluation of Tree-Based Algorithms for Intonational Breaks Representation
Abstract. The prosodic specification of an utterance to be spoken by a Textto-Speech synthesis system can be devised in break indices, pitch accents and boundary tones. In particu...
Panagiotis Zervas, Gerasimos Xydas, Nikos Fakotaki...
COLT
2004
Springer
14 years 3 months ago
Performance Guarantees for Regularized Maximum Entropy Density Estimation
Abstract. We consider the problem of estimating an unknown probability distribution from samples using the principle of maximum entropy (maxent). To alleviate overfitting with a v...
Miroslav Dudík, Steven J. Phillips, Robert ...
COLT
2004
Springer
14 years 3 months ago
Boosting Based on a Smooth Margin
Abstract. We study two boosting algorithms, Coordinate Ascent Boosting and Approximate Coordinate Ascent Boosting, which are explicitly designed to produce maximum margins. To deri...
Cynthia Rudin, Robert E. Schapire, Ingrid Daubechi...
CP
2004
Springer
14 years 3 months ago
Understanding Random SAT: Beyond the Clauses-to-Variables Ratio
It is well known that the ratio of the number of clauses to the number of variables in a random k-SAT instance is highly correlated with the instance’s empirical hardness. We con...
Eugene Nudelman, Kevin Leyton-Brown, Holger H. Hoo...
PPSN
2004
Springer
14 years 3 months ago
Credit Assignment Among Neurons in Co-evolving Populations
Different credit assignment strategies are investigated in a two level co-evolutionary model which involves a population of Gaussian neurons and a population of radial basis funct...
Vineet R. Khare, Xin Yao, Bernhard Sendhoff