Sciweavers

3556 search results - page 217 / 712
» Can machine learning be secure
Sort
View
94
Voted
ICML
2004
IEEE
16 years 1 months ago
A multiplicative up-propagation algorithm
We present a generalization of the nonnegative matrix factorization (NMF), where a multilayer generative network with nonnegative weights is used to approximate the observed nonne...
Jong-Hoon Ahn, Seungjin Choi, Jong-Hoon Oh
ICALT
2009
IEEE
15 years 7 months ago
Collaboration Support in Argumentation Systems for Education via Flexible Architectures
While argumentation is highly important for humans in many different aspects of life, it is hard to teach large groups to argue. Classic face-to-face approaches, which have shown ...
Frank Loll, Niels Pinkwart
91
Voted
ECML
2007
Springer
15 years 7 months ago
Analyzing Co-training Style Algorithms
Co-training is a semi-supervised learning paradigm which trains two learners respectively from two different views and lets the learners label some unlabeled examples for each oth...
Wei Wang, Zhi-Hua Zhou
ICALT
2006
IEEE
15 years 6 months ago
CSCL Scripting Patterns: Hierarchical Relationships and Applicability
The use of patterns in e-learning is being recently proposed with different purposes and scopes. This paper provides a unifying view of several representative proposals in order t...
Davinia Hernández Leo, Eloy D. Villasclaras...
88
Voted
ICALT
2003
IEEE
15 years 6 months ago
Real-Time Collaborative Problem Solving: A Study on Alternative Coordination Mechanisms
It is believed that computer-supported collaboration at a distance can stimulate learning. In this paper an innovative environment that permits real-time collaborative problem sol...
Nikolaos M. Avouris, Meletis Margaritis, Vassilis ...