Sciweavers

988 search results - page 179 / 198
» Intrusion Detection with Neural Networks
Sort
View
WISE
2006
Springer
14 years 1 months ago
Finding Reliable Recommendations for Trust Model
This paper presents a novel context-based approach to find reliable recommendations for trust model in ubiquitous environments. Context is used in our approach to analyze the userâ...
Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Ko...
ANNPR
2006
Springer
13 years 11 months ago
Fast Training of Linear Programming Support Vector Machines Using Decomposition Techniques
Abstract. Decomposition techniques are used to speed up training support vector machines but for linear programming support vector machines (LP-SVMs) direct implementation of decom...
Yusuke Torii, Shigeo Abe
ICANN
2010
Springer
13 years 9 months ago
Empirical Analysis of the Divergence of Gibbs Sampling Based Learning Algorithms for Restricted Boltzmann Machines
Abstract. Learning algorithms relying on Gibbs sampling based stochastic approximations of the log-likelihood gradient have become a common way to train Restricted Boltzmann Machin...
Asja Fischer, Christian Igel
NN
2010
Springer
183views Neural Networks» more  NN 2010»
13 years 6 months ago
Dimensionality reduction for density ratio estimation in high-dimensional spaces
The ratio of two probability density functions is becoming a quantity of interest these days in the machine learning and data mining communities since it can be used for various d...
Masashi Sugiyama, Motoaki Kawanabe, Pui Ling Chui
ESANN
2000
13 years 9 months ago
Learning VOR-like stabilization reflexes in robots
We present a binocular robot that learns compensatory camera movements for image stabilization purposes. Most essential in achieving satisfactory image stabilization performance i...
Francesco Panerai, Giorgio Metta, Giulio Sandini