Sciweavers

3556 search results - page 181 / 712
» Can machine learning be secure
Sort
View
96
Voted
ICML
2006
IEEE
16 years 1 months ago
Learning hierarchical task networks by observation
Knowledge-based planning methods offer benefits over classical techniques, but they are time consuming and costly to construct. There has been research on learning plan knowledge ...
Negin Nejati, Pat Langley, Tolga Könik
93
Voted
ICML
2006
IEEE
16 years 1 months ago
Constructing informative priors using transfer learning
Many applications of supervised learning require good generalization from limited labeled data. In the Bayesian setting, we can try to achieve this goal by using an informative pr...
Rajat Raina, Andrew Y. Ng, Daphne Koller
101
Voted
ICALT
2007
IEEE
15 years 2 months ago
An Ontological Approach for Semantic Learning Objects Interoperability
This paper presents a semantic-aware classification algorithm that can leverage the interoperability among semantically heterogeneous learning object repositories using different ...
Ming-Che Lee, Kun Hua Tsai, Tung Cheng Hsieh, Ti K...
103
Voted
ML
1998
ACM
117views Machine Learning» more  ML 1998»
15 years 11 days ago
Learning Team Strategies: Soccer Case Studies
We use simulated soccer to study multiagent learning. Each team's players (agents) share action set and policy, but may behave di erently due to position-dependent inputs. All...
Rafal Salustowicz, Marco Wiering, Jürgen Schm...
98
Voted
ICML
1996
IEEE
16 years 1 months ago
Passive Distance Learning for Robot Navigation
Autonomous mobile robots need good models of their environment, sensors and actuators to navigate reliably and efficiently. While this information can be supplied by humans, or le...
Sven Koenig, Reid G. Simmons