Sciweavers

3556 search results - page 181 / 712
» Can machine learning be secure
Sort
View
ICML
2006
IEEE
16 years 5 months ago
Learning hierarchical task networks by observation
Knowledge-based planning methods offer benefits over classical techniques, but they are time consuming and costly to construct. There has been research on learning plan knowledge ...
Negin Nejati, Pat Langley, Tolga Könik
ICML
2006
IEEE
16 years 5 months ago
Constructing informative priors using transfer learning
Many applications of supervised learning require good generalization from limited labeled data. In the Bayesian setting, we can try to achieve this goal by using an informative pr...
Rajat Raina, Andrew Y. Ng, Daphne Koller
ICALT
2007
IEEE
15 years 6 months ago
An Ontological Approach for Semantic Learning Objects Interoperability
This paper presents a semantic-aware classification algorithm that can leverage the interoperability among semantically heterogeneous learning object repositories using different ...
Ming-Che Lee, Kun Hua Tsai, Tung Cheng Hsieh, Ti K...
ML
1998
ACM
117views Machine Learning» more  ML 1998»
15 years 4 months ago
Learning Team Strategies: Soccer Case Studies
We use simulated soccer to study multiagent learning. Each team's players (agents) share action set and policy, but may behave di erently due to position-dependent inputs. All...
Rafal Salustowicz, Marco Wiering, Jürgen Schm...
ICML
1996
IEEE
16 years 5 months ago
Passive Distance Learning for Robot Navigation
Autonomous mobile robots need good models of their environment, sensors and actuators to navigate reliably and efficiently. While this information can be supplied by humans, or le...
Sven Koenig, Reid G. Simmons