Sciweavers

606 search results - page 95 / 122
» Analyzing learning concepts in intelligent tutoring systems
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
15 years 10 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
CCIA
2008
Springer
14 years 12 months ago
Probabilistic Dynamic Belief Logic for Image and Reputation
Since electronic and open environments became a reality, computational trust and reputation models have attracted increasing interest in the field of multiagent systems (MAS). Some...
Isaac Pinyol, Jordi Sabater-Mir, Pilar Dellunde
CIKM
2008
Springer
14 years 12 months ago
Learning to link with wikipedia
This paper describes how to automatically cross-reference documents with Wikipedia: the largest knowledge base ever known. It explains how machine learning can be used to identify...
David N. Milne, Ian H. Witten
ALT
2011
Springer
13 years 10 months ago
On the Expressive Power of Deep Architectures
Deep architectures are families of functions corresponding to deep circuits. Deep Learning algorithms are based on parametrizing such circuits and tuning their parameters so as to ...
Yoshua Bengio, Olivier Delalleau
ATAL
2009
Springer
15 years 4 months ago
Bounded rationality via recursion
Current trends in model construction in the field of agentbased computational economics base behavior of agents on either game theoretic procedures (e.g. belief learning, fictit...
Maciej Latek, Robert L. Axtell, Bogumil Kaminski