Sciweavers

3556 search results - page 685 / 712
» Can machine learning be secure
Sort
View
ECML
2004
Springer
14 years 1 months ago
The Principal Components Analysis of a Graph, and Its Relationships to Spectral Clustering
This work presents a novel procedure for computing (1) distances between nodes of a weighted, undirected, graph, called the Euclidean Commute Time Distance (ECTD), and (2) a subspa...
Marco Saerens, François Fouss, Luh Yen, Pie...
ESSMAC
2003
Springer
14 years 27 days ago
Joint Optimization of Wireless Communication and Networked Control Systems
Abstract. We consider a linear system, such as an estimator or a controller, in which several signals are transmitted over wireless communication channels. With the coding and medi...
Lin Xiao, Mikael Johansson, Haitham A. Hindi, Step...
DL
1998
Springer
111views Digital Library» more  DL 1998»
13 years 12 months ago
SONIA: A Service for Organizing Networked Information Autonomously
The recent explosion of on-line information in Digital Libraries and on the World Wide Web has given rise to a number of query-based search engines and manually constructed topica...
Mehran Sahami, Salim Yusufali, Michelle Q. Wang Ba...
ECAI
2004
Springer
13 years 11 months ago
Lakatos-Style Automated Theorem Modification
We describe a flexible approach to automated reasoning, where non-theorems can be automatically altered to produce proved results which are related to the original. This is achieve...
Simon Colton, Alison Pease
DRR
2010
13 years 10 months ago
Biomedical article retrieval using multimodal features and image annotations in region-based CBIR
Biomedical images are invaluable in establishing diagnosis, acquiring technical skills, and implementing best practices in many areas of medicine. At present, images needed for in...
Daekeun You, Sameer Antani, Dina Demner-Fushman, M...