Sciweavers

2111 search results - page 177 / 423
» An Approach to Software Testing of Machine Learning Applicat...
Sort
View
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 11 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
ICMLC
2005
Springer
15 years 9 months ago
Evolutionary Synthesis of Micromachines Using Supervisory Multiobjective Interactive Evolutionary Computation
A novel method of Interactive Evolutionary Computation (IEC) for the design of microelectromechanical systems (MEMS) is presented. As the main limitation of IEC is human fatigue, a...
Raffi R. Kamalian, Ying Zhang, Hideyuki Takagi, Al...
MLCW
2005
Springer
15 years 9 months ago
Recognizing Textual Entailment Via Atomic Propositions
Abstract. This paper describes Macquarie University’s Centre for Language Technology contribution to the PASCAL 2005 Recognizing Textual Entailment challenge. Our main aim was to...
Elena Akhmatova, Diego Mollá
IAT
2003
IEEE
15 years 9 months ago
SIMPLE - A Multi-Agent System for Simultaneous and Related Auctions
This work describes a multi-agent architecture and strategy for trade in simultaneous and related auctions. The proposed SIMPLE Agency combines an integer programming model, machi...
Ruy Luiz Milidiú, Taciana Melcop, Frederico...
ML
2000
ACM
105views Machine Learning» more  ML 2000»
15 years 3 months ago
Multiple Comparisons in Induction Algorithms
Abstract. A single mechanism is responsible for three pathologies of induction algorithms: attribute selection errors, overfitting, and oversearching. In each pathology, induction ...
David D. Jensen, Paul R. Cohen