Sciweavers

3556 search results - page 94 / 712
» Can machine learning be secure
Sort
View
ICALT
2007
IEEE
14 years 4 months ago
The application of IMS Learning Design to Develop Compute-based Educational Game
How can game designers realize the balance of “educational function” and “entertainment” in a Computer-based Educational Game (CEG)? The concept of IMS learning design (LD...
Miaomiao Zeng, Yueliang Zhou
MLDM
2007
Springer
14 years 4 months ago
Nonlinear Feature Selection by Relevance Feature Vector Machine
Support vector machine (SVM) has received much attention in feature selection recently because of its ability to incorporate kernels to discover nonlinear dependencies between feat...
Haibin Cheng, Haifeng Chen, Guofei Jiang, Kenji Yo...
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 10 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 3 months ago
Incorporating prior knowledge with weighted margin support vector machines
Like many purely data-driven machine learning methods, Support Vector Machine (SVM) classifiers are learned exclusively from the evidence presented in the training dataset; thus ...
Xiaoyun Wu, Rohini K. Srihari
SIGIR
2003
ACM
14 years 3 months ago
Question classification using support vector machines
Question classification is very important for question answering. This paper presents our research work on automatic question classification through machine learning approaches. W...
Dell Zhang, Wee Sun Lee