Sciweavers

3556 search results - page 164 / 712
» Can machine learning be secure
Sort
View
113
Voted
ICML
1998
IEEE
16 years 1 months ago
Learning Collaborative Information Filters
Predicting items a user would like on the basis of other users' ratings for these items has become a well-established strategy adopted by many recommendation services on the ...
Daniel Billsus, Michael J. Pazzani
98
Voted
ML
2002
ACM
114views Machine Learning» more  ML 2002»
15 years 10 days ago
Building a Basic Block Instruction Scheduler with Reinforcement Learning and Rollouts
The execution order of a block of computer instructions on a pipelined machine can make a difference in running time by a factor of two or more. Compilers use heuristic schedulers...
Amy McGovern, J. Eliot B. Moss, Andrew G. Barto
90
Voted
ICML
2009
IEEE
16 years 1 months ago
Learning kernels from indefinite similarities
Similarity measures in many real applications generate indefinite similarity matrices. In this paper, we consider the problem of classification based on such indefinite similariti...
Yihua Chen, Maya R. Gupta, Benjamin Recht
110
Voted
DAGSTUHL
2004
15 years 2 months ago
Learning with Local Models
Next to prediction accuracy, the interpretability of models is one of the fundamental criteria for machine learning algorithms. While high accuracy learners have intensively been e...
Stefan Rüping
120
Voted
ACE
2004
199views Education» more  ACE 2004»
15 years 2 months ago
VELNET (Virtual Environment for Learning Networking)
The problems of providing a real, physical specialist laboratory to teach computer networking such as, the lack of funding and physical space and the risks and threats to the netw...
Bruce Kneale, Ain Y. De Horta, Ilona Box