Sciweavers

3556 search results - page 202 / 712
» Can machine learning be secure
Sort
View
117
Voted
ICML
2005
IEEE
16 years 1 months ago
Learning approximate preconditions for methods in hierarchical plans
A significant challenge in developing planning systems for practical applications is the difficulty of acquiring the domain knowledge needed by such systems. One method for acquir...
Dana S. Nau, David W. Aha, Héctor Muñ...
ICML
2005
IEEE
16 years 1 months ago
Learning hierarchical multi-category text classification models
We present a kernel-based algorithm for hierarchical text classification where the documents are allowed to belong to more than one category at a time. The classification model is...
Craig Saunders, John Shawe-Taylor, Juho Rousu, S&a...
82
Voted
ICALT
2005
IEEE
15 years 6 months ago
Flexible and Exploratory Learning by Polyscopic Topic Maps
Flexible and active education calls for a comprehensive restructuring of the traditional university course format. Such restructuring can be done in a natural and coherent way by ...
Dino Karabeg, Rolf Guescini, Tommy W. Nordeng
ICANN
2009
Springer
15 years 5 months ago
Constrained Learning Vector Quantization or Relaxed k-Separability
Neural networks and other sophisticated machine learning algorithms frequently miss simple solutions that can be discovered by a more constrained learning methods. Transition from ...
Marek Grochowski, Wlodzislaw Duch
108
Voted
UAI
2008
15 years 2 months ago
Multi-View Learning over Structured and Non-Identical Outputs
In many machine learning problems, labeled training data is limited but unlabeled data is ample. Some of these problems have instances that can be factored into multiple views, ea...
Kuzman Ganchev, João Graça, John Bli...