Sciweavers

3556 search results - page 242 / 712
» Can machine learning be secure
Sort
View
173
Voted
COMPLEXITY
2007
151views more  COMPLEXITY 2007»
15 years 5 months ago
From complex conflicts to stable cooperation: Cases in environment and security
: Conflict is a dynamic and complex form of human interaction, often emerging from incompatible actions, values and goals, and consuming a considerable amount of resources. Conflic...
Jürgen Scheffran, Bruce Hannon
ICML
2007
IEEE
16 years 5 months ago
Discriminant analysis in correlation similarity measure space
Correlation is one of the most widely used similarity measures in machine learning like Euclidean and Mahalanobis distances. However, compared with proposed numerous discriminant ...
Yong Ma, Shihong Lao, Erina Takikawa, Masato Kawad...
ICML
2009
IEEE
15 years 12 months ago
Using fast weights to improve persistent contrastive divergence
The most commonly used learning algorithm for restricted Boltzmann machines is contrastive divergence which starts a Markov chain at a data point and runs the chain for only a few...
Tijmen Tieleman, Geoffrey E. Hinton
154
Voted
ICALT
2003
IEEE
15 years 10 months ago
Initializing Student Models in Web-Based ITSs: A Generic Approach
The issue of initializing the model of a new student is of great importance for educational applications that aim at offering individualized support to students. In this paper we ...
Victoria Tsiriga, Maria Virvou
ECML
2006
Springer
15 years 8 months ago
Fisher Kernels for Relational Data
Abstract. Combining statistical and relational learning receives currently a lot of attention. The majority of statistical relational learning approaches focus on density estimatio...
Uwe Dick, Kristian Kersting