Sciweavers

3556 search results - page 251 / 712
» Can machine learning be secure
Sort
View
ICMLC
2010
Springer
15 years 3 months ago
Multiple kernel learning and feature space denoising
We review a multiple kernel learning (MKL) technique called p regularised multiple kernel Fisher discriminant analysis (MK-FDA), and investigate the effect of feature space denois...
Fei Yan, Josef Kittler, Krystian Mikolajczyk
EDUTAINMENT
2009
Springer
15 years 3 months ago
Design of an Interactive Table for Mixed-Reality Learning Environments
This paper presents a prototype of a low-cost Mixed Reality Interactive Table (MRIT) which is equipped with a Web camera, a projector, animal-appearance robots, gloves with acceler...
Mu-Chun Su, Gwo-Dong Chen, Yi-Shan Tsai, Ren-Hao Y...
ICML
2006
IEEE
16 years 6 months ago
Using inaccurate models in reinforcement learning
In the model-based policy search approach to reinforcement learning (RL), policies are found using a model (or "simulator") of the Markov decision process. However, for ...
Pieter Abbeel, Morgan Quigley, Andrew Y. Ng
ALT
2006
Springer
16 years 2 months ago
Iterative Learning from Positive Data and Negative Counterexamples
A model for learning in the limit is defined where a (so-called iterative) learner gets all positive examples from the target language, tests every new conjecture with a teacher ...
Sanjay Jain, Efim B. Kinber
ECML
2001
Springer
15 years 9 months ago
Iterative Double Clustering for Unsupervised and Semi-supervised Learning
We present a powerful meta-clustering technique called Iterative Double Clustering (IDC). The IDC method is a natural extension of the recent Double Clustering (DC) method of Slon...
Ran El-Yaniv, Oren Souroujon