Sciweavers

3556 search results - page 708 / 712
» Can machine learning be secure
Sort
View
BMCBI
2007
95views more  BMCBI 2007»
13 years 7 months ago
Methods for estimating human endogenous retrovirus activities from EST databases
Background: Human endogenous retroviruses (HERVs) are surviving traces of ancient retrovirus infections and now reside within the human DNA. Recently HERV expression has been dete...
Merja Oja, Jaakko Peltonen, Jonas Blomberg, Samuel...
ISCI
2008
165views more  ISCI 2008»
13 years 7 months ago
Support vector regression from simulation data and few experimental samples
This paper considers nonlinear modeling based on a limited amount of experimental data and a simulator built from prior knowledge. The problem of how to best incorporate the data ...
Gérard Bloch, Fabien Lauer, Guillaume Colin...
JAIR
2008
157views more  JAIR 2008»
13 years 7 months ago
Qualitative System Identification from Imperfect Data
Experience in the physical sciences suggests that the only realistic means of understanding complex systems is through the use of mathematical models. Typically, this has come to ...
George Macleod Coghill, Ashwin Srinivasan, Ross D....
JCB
2008
159views more  JCB 2008»
13 years 7 months ago
BayesMD: Flexible Biological Modeling for Motif Discovery
We present BayesMD, a Bayesian Motif Discovery model with several new features. Three different types of biological a priori knowledge are built into the framework in a modular fa...
Man-Hung Eric Tang, Anders Krogh, Ole Winther
JMLR
2008
129views more  JMLR 2008»
13 years 7 months ago
Finite-Time Bounds for Fitted Value Iteration
In this paper we develop a theoretical analysis of the performance of sampling-based fitted value iteration (FVI) to solve infinite state-space, discounted-reward Markovian decisi...
Rémi Munos, Csaba Szepesvári