Sciweavers

3556 search results - page 63 / 712
» Can machine learning be secure
Sort
View
ALT
2010
Springer
13 years 11 months ago
Learning without Coding
Abstract. Iterative learning is a model of language learning from positive data, due to Wiehagen. When compared to a learner in Gold's original model of language learning from...
Samuel E. Moelius, Sandra Zilles
ICALT
2005
IEEE
14 years 3 months ago
Modeling of Process-Oriented Learning Designs
Process-oriented learning designs (POLD) are used to describe innovative teaching activities (processes) that can be generalised and used across different disciplines. This paper ...
Olivera Marjanovic
ECML
1998
Springer
14 years 2 months ago
First-Order Learning for Web Mining
We present compelling evidence that the World Wide Web is a domain in which applications can benefit from using first-order learning methods, since the graph structure inherent in ...
Mark Craven, Seán Slattery, Kamal Nigam
ICALT
2006
IEEE
14 years 4 months ago
Using Ontologies to Model and Execute IMS Learning Design Documents
This paper briefly describes how ontologies can be used to model, validate and execute IMS Learning Design. The main contribution relies on incorporate the implicit knowledge foun...
Ricardo R. Amorim, Manuel Lama, Eduardo Sán...
PAKDD
2011
ACM
253views Data Mining» more  PAKDD 2011»
13 years 28 days ago
Balance Support Vector Machines Locally Using the Structural Similarity Kernel
A structural similarity kernel is presented in this paper for SVM learning, especially for learning with imbalanced datasets. Kernels in SVM are usually pairwise, comparing the sim...
Jianxin Wu