Sciweavers

3556 search results - page 85 / 712
» Can machine learning be secure
Sort
View
ICML
2007
IEEE
14 years 11 months ago
Cross-domain transfer for reinforcement learning
A typical goal for transfer learning algorithms is to utilize knowledge gained in a source task to learn a target task faster. Recently introduced transfer methods in reinforcemen...
Matthew E. Taylor, Peter Stone
ECTEL
2006
Springer
14 years 1 months ago
Personalization Services in Argumentation Tools: a Catalyst for Learning
Argumentation is considered as an essential element for effective learning since it enables learners to develop their points of view and refine their knowledge. Our aim being to fa...
Christina E. Evangelou, Nikos Karousos, Manolis Tz...
ICALT
2009
IEEE
14 years 1 months ago
iGLS: Intelligent Grouping for Online Collaborative Learning
One of the factors that affect successful collaborative learning is the composition of collaborative groups. Due to the lack of intelligent grouping according to learners’ pedag...
Shuangyan Liu, Mike Joy, Nathan Griffiths
ACL
2007
13 years 11 months ago
Guiding Semi-Supervision with Constraint-Driven Learning
Over the last few years, two of the main research directions in machine learning of natural language processing have been the study of semi-supervised learning algorithms as a way...
Ming-Wei Chang, Lev-Arie Ratinov, Dan Roth
IRI
2008
IEEE
14 years 4 months ago
Compound record clustering algorithm for design pattern detection by decision tree learning
Recovering design patterns applied in a system can help refactoring the system. Machine learning algorithms have been successfully applied in mining data patterns. However, one of...
Jing Dong, Yongtao Sun, Yajing Zhao