Sciweavers

8381 search results - page 1665 / 1677
» The security of machine learning
Sort
View
KI
2002
Springer
13 years 7 months ago
Advantages, Opportunities and Limits of Empirical Evaluations: Evaluating Adaptive Systems
While empirical evaluations are a common research method in some areas of Artificial Intelligence (AI), others still neglect this approach. This article outlines both the opportun...
Stephan Weibelzahl, Gerhard Weber
NN
2002
Springer
115views Neural Networks» more  NN 2002»
13 years 7 months ago
A self-organising network that grows when required
The ability to grow extra nodes is a potentially useful facility for a self-organising neural network. A network that can add nodes into its map space can approximate the input sp...
Stephen Marsland, Jonathan Shapiro, Ulrich Nehmzow
TASLP
2002
143views more  TASLP 2002»
13 years 7 months ago
Creating conversational interfaces for children
Creating conversational interfaces for children is challenging in several respects. These include acoustic modeling for automatic speech recognition (ASR), language and dialog mode...
Shrikanth S. Narayanan, Alexandros Potamianos
CIKM
2010
Springer
13 years 6 months ago
Exploiting site-level information to improve web search
Ranking Web search results has long evolved beyond simple bag-of-words retrieval models. Modern search engines routinely employ machine learning ranking that relies on exogenous r...
Andrei Z. Broder, Evgeniy Gabrilovich, Vanja Josif...
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 6 months ago
Viewpoints: A high-performance high-dimensional exploratory data analysis tool
Scientific data sets continue to increase in both size and complexity. In the past, dedicated graphics systems at supercomputing centers were required to visualize large data sets,...
Paul R. Gazis, C. Levit, Michael J. Way
« Prev « First page 1665 / 1677 Last » Next »