Sciweavers

7853 search results - page 254 / 1571
» Learning from Each Other
Sort
View
152
Voted
JMLR
2011
137views more  JMLR 2011»
14 years 11 months ago
Online Learning in Case of Unbounded Losses Using Follow the Perturbed Leader Algorithm
In this paper the sequential prediction problem with expert advice is considered for the case where losses of experts suffered at each step cannot be bounded in advance. We presen...
Vladimir V. V'yugin
ICMLA
2007
15 years 6 months ago
SVMotif: A Machine Learning Motif Algorithm
We describe SVMotif, a support vector machine-based learning algorithm for identification of cellular DNA transcription factor (TF) motifs extrapolated from known TF-gene interact...
Mark A. Kon, Yue Fan, Dustin T. Holloway, Charles ...
NIPS
2007
15 years 6 months ago
Privacy-Preserving Belief Propagation and Sampling
We provide provably privacy-preserving versions of belief propagation, Gibbs sampling, and other local algorithms — distributed multiparty protocols in which each party or verte...
Michael Kearns, Jinsong Tan, Jennifer Wortman
135
Voted
DIS
2009
Springer
15 years 11 months ago
MICCLLR: Multiple-Instance Learning Using Class Conditional Log Likelihood Ratio
Multiple-instance learning (MIL) is a generalization of the supervised learning problem where each training observation is a labeled bag of unlabeled instances. Several supervised ...
Yasser El-Manzalawy, Vasant Honavar
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 8 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore