Sciweavers

3556 search results - page 641 / 712
» Can machine learning be secure
Sort
View
ISORC
2000
IEEE
14 years 2 months ago
Establishing a Data-Mining Environment for Wartime Event Prediction with an Object-Oriented Command and Control Database
This paper documents progress to date on a research project, the goal of which is wartime event prediction. The paper describes the operational concept, the datamining environment...
Marion G. Ceruti, S. Joe McCarthy
SIGIR
1998
ACM
14 years 2 months ago
Boosting and Rocchio Applied to Text Filtering
We discuss two learning algorithms for text filtering: modified Rocchio and a boosting algorithm called AdaBoost. We show how both algorithms can be adapted to maximize any gene...
Robert E. Schapire, Yoram Singer, Amit Singhal
GLOBECOM
2009
IEEE
14 years 2 months ago
Exploring Simulated Annealing and Graphical Models for Optimization in Cognitive Wireless Networks
In this paper we discuss the design of optimization algorithms for cognitive wireless networks (CWNs). Maximizing the perceived network performance towards applications by selectin...
Elena Meshkova, Janne Riihijärvi, Andreas Ach...
ICPR
2010
IEEE
14 years 1 months ago
Perceived Age Estimation under Lighting Condition Change by Covariate Shift Adaptation
—Over the recent years, a great deal of effort has been made to age estimation from face images. It has been reported that age can be accurately estimated under controlled enviro...
Kazuya Ueki, Masashi Sugiyama, Yasuyuki Ihara
AIRS
2006
Springer
14 years 1 months ago
A Novel Ant-Based Clustering Approach for Document Clustering
Recently, much research has been proposed using nature inspired algorithms to perform complex machine learning tasks. Ant Colony Optimization (ACO) is one such algorithm based on s...
Yulan He, Siu Cheung Hui, Yongxiang Sim