Sciweavers

3556 search results - page 177 / 712
» Can machine learning be secure
Sort
View
ALT
2008
Springer
15 years 9 months ago
Clustering with Interactive Feedback
In this paper, we initiate a theoretical study of the problem of clustering data under interactive feedback. We introduce a query-based model in which users can provide feedback to...
Maria-Florina Balcan, Avrim Blum
COCOON
1995
Springer
15 years 4 months ago
Constructing Craig Interpolation Formulas
A Craig interpolant of two inconsistent theories is a formula which is true in one and false in the other. This paper gives an eificient method for constructing a Craig interpolant...
Guoxiang Huang
121
Voted
ML
2006
ACM
132views Machine Learning» more  ML 2006»
15 years 19 days ago
A suffix tree approach to anti-spam email filtering
We present an approach to email filtering based on the suffix tree data structure. A method for the scoring of emails using the suffix tree is developed and a number of scoring and...
Rajesh Pampapathi, Boris Mirkin, Mark Levene
109
Voted
ICALT
2009
IEEE
14 years 10 months ago
Realtime Knowledge Space Skill Assessment for Personalized Digital Educational Games
Digital Educational Games offer immersive environments through which learners can enjoy motivational and compelling educational experiences. Applying personalization techniques wi...
Owen Conlan, Cormac Hampson, Neil Peirce, Michael ...
COLT
2003
Springer
15 years 6 months ago
Learning with Equivalence Constraints and the Relation to Multiclass Learning
Abstract. We study the problem of learning partitions using equivalence constraints as input. This is a binary classification problem in the product space of pairs of datapoints. ...
Aharon Bar-Hillel, Daphna Weinshall