Sciweavers

3556 search results - page 78 / 712
» Can machine learning be secure
Sort
View
ICML
1998
IEEE
14 years 11 months ago
A Randomized ANOVA Procedure for Comparing Performance Curves
Three factors are related in analyses of performance curves such as learning curves: the amount of training, the learning algorithm, and performance. Often we want to know whether...
Justus H. Piater, Paul R. Cohen, Xiaoqin Zhang, Mi...
ICML
2008
IEEE
14 years 11 months ago
Extracting and composing robust features with denoising autoencoders
Previous work has shown that the difficulties in learning deep generative or discriminative models can be overcome by an initial unsupervised learning step that maps inputs to use...
Pascal Vincent, Hugo Larochelle, Yoshua Bengio, Pi...
ICALT
2005
IEEE
14 years 3 months ago
English Class on the Air: Mobile Language Learning with Cell Phones
Busy, active adults often do not have the time or ability to study in traditional, face-to-face classroom settings. In addition, adult learners may need access to content or exper...
Timothy G. Collins
ICML
2010
IEEE
13 years 11 months ago
Multiagent Inductive Learning: an Argumentation-based Approach
Multiagent Inductive Learning is the problem that groups of agents face when they want to perform inductive learning, but the data of interest is distributed among them. This pape...
Santiago Ontañón, Enric Plaza
PET
2010
Springer
14 years 2 months ago
On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot
Web Search is one of the most rapidly growing applications on the internet today. However, the current practice followed by most search engines – of logging and analyzing usersâ€...
Sai Teja Peddinti, Nitesh Saxena