Sciweavers

3556 search results - page 649 / 712
» Can machine learning be secure
Sort
View
IQ
2003
13 years 11 months ago
ClueMaker: A Language for Approximate Record Matching
We introduce ClueMaker, the first language designed specifically for approximate record matching. Clues written in ClueMaker predict whether two records denote the same thing based...
Martin Buechi, Andrew Borthwick, Adam Winkel, Arth...
NIPS
2003
13 years 11 months ago
Extreme Components Analysis
Principal components analysis (PCA) is one of the most widely used techniques in machine learning and data mining. Minor components analysis (MCA) is less well known, but can also...
Max Welling, Felix V. Agakov, Christopher K. I. Wi...
AAAI
1998
13 years 11 months ago
Metacognition in Software Agents Using Classifier Systems
Software agents "living" and acting in a real world software environment, such as an operating system, a network, or a database system, can carry out many tasks for huma...
Zhaohua Zhang, Stan Franklin, Dipankar Dasgupta
ANLP
2000
109views more  ANLP 2000»
13 years 11 months ago
Predicting Automatic Speech Recognition Performance Using Prosodic Cues
In spoken dialogue systems, it is important for a system to know how likely a speech recognition hypothesis is to be correct, so it can reprompt for fresh input, or, in cases wher...
Diane J. Litman, Julia Hirschberg, Marc Swerts
UAI
2003
13 years 11 months ago
Exploiting Locality in Searching the Web
Published experiments on spidering the Web suggest that, given training data in the form of a (relatively small) subgraph of the Web containing a subset of a selected class of tar...
Joel Young, Thomas Dean