Sciweavers

3556 search results - page 76 / 712
» Can machine learning be secure
Sort
View
ICML
2010
IEEE
13 years 11 months ago
Boosting for Regression Transfer
The goal of transfer learning is to improve the learning of a new target concept given knowledge of related source concept(s). We introduce the first boosting-based algorithms for...
David Pardoe, Peter Stone
EUROCAST
2005
Springer
166views Hardware» more  EUROCAST 2005»
14 years 3 months ago
A New Pseudo-Random Generator Based on Gollmann Cascades of Baker-Register-Machines
In this paper, we present a new pseudo-random sequence generator, constructed by the generalized discrete Baker transformation. This new generator is called Cascaded Baker Register...
Dominik Jochinger, Franz Pichler
ICALT
2005
IEEE
14 years 3 months ago
Mining Learner Profile Utilizing Association Rule for Common Learning Misconception Diagnosis
With the rapid growth of computer and Internet technologies, e-learning has become a major trend in the computer assisted teaching and learning fields. Most past researches for we...
Chih-Ming Chen, Ying-Ling Hsieh
ML
2002
ACM
223views Machine Learning» more  ML 2002»
13 years 9 months ago
Text Categorization with Support Vector Machines. How to Represent Texts in Input Space?
The choice of the kernel function is crucial to most applications of support vector machines. In this paper, however, we show that in the case of text classification, term-frequenc...
Edda Leopold, Jörg Kindermann
ECML
2006
Springer
14 years 1 months ago
Learning in One-Shot Strategic Form Games
Abstract. We propose a machine learning approach to action prediction in oneshot games. In contrast to the huge literature on learning in games where an agent's model is deduc...
Alon Altman, Avivit Bercovici-Boden, Moshe Tennenh...