Sciweavers

3556 search results - page 86 / 712
» Can machine learning be secure
Sort
View
COLT
2007
Springer
14 years 4 months ago
Minimax Bounds for Active Learning
This paper analyzes the potential advantages and theoretical challenges of “active learning” algorithms. Active learning involves sequential sampling procedures that use infor...
Rui Castro, Robert D. Nowak
ICALT
2003
IEEE
14 years 3 months ago
Visualization of the Learning Process Using Concept Mapping
Visualization of the learning processes is a powerful way to help students to understand their curricula and the structure behind them. CME2 is a prototype software of this favour...
Jussi A. Nuutinen, Erkki Sutinen
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 4 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
ICML
2008
IEEE
14 years 11 months ago
Democratic approximation of lexicographic preference models
Previous algorithms for learning lexicographic preference models (LPMs) produce a "best guess" LPM that is consistent with the observations. Our approach is more democra...
Fusun Yaman, Thomas J. Walsh, Michael L. Littman, ...
ICML
2007
IEEE
14 years 11 months ago
Support cluster machine
For large-scale classification problems, the training samples can be clustered beforehand as a downsampling pre-process, and then only the obtained clusters are used for training....
Bin Li, Mingmin Chi, Jianping Fan, Xiangyang Xue