Sciweavers

3556 search results - page 218 / 712
» Can machine learning be secure
Sort
View
103
Voted
ICADL
2003
Springer
92views Education» more  ICADL 2003»
15 years 6 months ago
Improving Automatic Labelling through RDF Management
Building a shared and widely accessible repository, in order for scientists and end users to exploit it easily, results in tackling a variety of issues. Among others, the need for ...
Floriana Esposito, Stefano Ferilli, Nicola Di Maur...
88
Voted
NAACL
2007
15 years 2 months ago
A High Accuracy Method for Semi-Supervised Information Extraction
Customization to specific domains of discourse and/or user requirements is one of the greatest challenges for today’s Information Extraction (IE) systems. While demonstrably eff...
Stephen Tratz, Antonio Sanfilippo
114
Voted
GECCO
2008
Springer
135views Optimization» more  GECCO 2008»
15 years 1 months ago
Evolving sequence patterns for prediction of sub-cellular locations of eukaryotic proteins
A genetic algorithm (GA) is utilised to discover known and novel PROSITE-like sequence templates that can be used to classify the sub-cellular location of eukaryotic proteins. Whi...
Greg Paperin
112
Voted
ML
2006
ACM
187views Machine Learning» more  ML 2006»
15 years 23 days ago
Modeling, analyzing, and synthesizing expressive piano performance with graphical models
Abstract Trained musicians intuitively produce expressive variations that add to their audience's enjoyment. However, there is little quantitative information about the kinds ...
Graham Grindlay, David P. Helmbold
125
Voted
ML
2012
ACM
385views Machine Learning» more  ML 2012»
13 years 8 months ago
An alternative view of variational Bayes and asymptotic approximations of free energy
Bayesian learning, widely used in many applied data-modeling problems, is often accomplished with approximation schemes because it requires intractable computation of the posterio...
Kazuho Watanabe