Sciweavers

3556 search results - page 230 / 712
» Can machine learning be secure
Sort
View
163
Voted
SLSFS
2005
Springer
15 years 10 months ago
Random Projection, Margins, Kernels, and Feature-Selection
Random projection is a simple technique that has had a number of applications in algorithm design. In the context of machine learning, it can provide insight into questions such as...
Avrim Blum
152
Voted
ALT
2005
Springer
16 years 1 months ago
Gold-Style and Query Learning Under Various Constraints on the Target Class
In language learning, strong relationships between Gold-style models and query models have recently been observed: in some quite general setting Gold-style learners can be replaced...
Sanjay Jain, Steffen Lange, Sandra Zilles
119
Voted
ACSAC
2005
IEEE
15 years 10 months ago
ScriptGen: an automated script generation tool for honeyd
Honeyd [14] is a popular tool developed by Niels Provos that offers a simple way to emulate services offered by several machines on a single PC. It is a so called low interaction ...
Corrado Leita, Ken Mermoud, Marc Dacier
161
Voted
ECAI
2010
Springer
15 years 6 months ago
Learning When to Use Lazy Learning in Constraint Solving
Abstract. Learning in the context of constraint solving is a technique by which previously unknown constraints are uncovered during search and used to speed up subsequent search. R...
Ian P. Gent, Christopher Jefferson, Lars Kotthoff,...
ECML
2003
Springer
15 years 10 months ago
A Two-Level Learning Method for Generalized Multi-instance Problems
In traditional multi-instance (MI) learning, a single positive instance in a bag produces a positive class label. Hence, the learner knows how the bag’s class label depends on th...
Nils Weidmann, Eibe Frank, Bernhard Pfahringer