Sciweavers

3556 search results - page 190 / 712
» Can machine learning be secure
Sort
View
81
Voted
GEM
2008
15 years 2 months ago
Evaluating a Parallel Evolutionary Algorithm on the Chess Endgame Problem
Classifying the endgame positions in Chess can be challenging for humans and is known to be a difficult task in machine learning. An evolutionary algorithm would seem to be the ide...
Wayne Iba, Kelsey Marshman, Benjamin Fisk
OTM
2004
Springer
15 years 6 months ago
A Virtual-Machine-Based Middleware
Currently, a number of distributed software systems development tools exist, but typically they are designed either to satisfy industrial standards – industrial perspective – o...
Alcides Calsavara, Agnaldo K. Noda, Juarez da Cost...
131
Voted
BMCBI
2005
155views more  BMCBI 2005»
15 years 19 days ago
Mining protein function from text using term-based support vector machines
Background: Text mining has spurred huge interest in the domain of biology. The goal of the BioCreAtIvE exercise was to evaluate the performance of current text mining systems. We...
Simon B. Rice, Goran Nenadic, Benjamin J. Stapley
ML
2010
ACM
163views Machine Learning» more  ML 2010»
14 years 7 months ago
Classification with guaranteed probability of error
We introduce a general-purpose learning machine that we call the Guaranteed Error Machine, or GEM, and two learning algorithms, a real GEM algorithm and an ideal GEM algorithm. Th...
Marco C. Campi
GECCO
2006
Springer
138views Optimization» more  GECCO 2006»
15 years 4 months ago
Does overfitting affect performance in estimation of distribution algorithms
Estimation of Distribution Algorithms (EDAs) are a class of evolutionary algorithms that use machine learning techniques to solve optimization problems. Machine learning is used t...
Hao Wu, Jonathan L. Shapiro