Sciweavers

3556 search results - page 92 / 712
» Can machine learning be secure
Sort
View
ECML
2006
Springer
14 years 6 days ago
Efficient Large Scale Linear Programming Support Vector Machines
This paper presents a decomposition method for efficiently constructing 1-norm Support Vector Machines (SVMs). The decomposition algorithm introduced in this paper possesses many d...
Suvrit Sra
ICMLC
2010
Springer
13 years 8 months ago
Approaches to improving corpus quality for statistical machine translation
: The performance of a statistical machine translation (SMT) system heavily depends on the quantity and quality of the bilingual language resource. However, the pervious work mainl...
Peng Liu, Yu Zhou, Chengqing Zong
ECML
2003
Springer
14 years 3 months ago
Ensembles of Multi-instance Learners
In multi-instance learning, the training set comprises labeled bags that are composed of unlabeled instances, and the task is to predict the labels of unseen bags. Through analyzin...
Zhi-Hua Zhou, Min-Ling Zhang
ISCA
2007
IEEE
128views Hardware» more  ISCA 2007»
14 years 4 months ago
Performance and security lessons learned from virtualizing the alpha processor
Virtualization has become much more important throughout the computer industry both to improve security and to support multiple workloads on the same hardware with effective isola...
Paul A. Karger
NIPS
1998
13 years 11 months ago
Dynamically Adapting Kernels in Support Vector Machines
The kernel-parameter is one of the few tunable parameters in Support Vector machines, controlling the complexity of the resulting hypothesis. Its choice amounts to model selection...
Nello Cristianini, Colin Campbell, John Shawe-Tayl...