Sciweavers

3556 search results - page 254 / 712
» Can machine learning be secure
Sort
View
CORR
1998
Springer
153views Education» more  CORR 1998»
15 years 5 months ago
Identifying Discourse Markers in Spoken Dialog
In this paper, we present a method for identifying discourse marker usage in spontaneous speech based on machine learning. Discourse markers are denoted by special POS tags, and t...
Peter A. Heeman, Donna K. Byron, James F. Allen
ICNC
2005
Springer
15 years 10 months ago
Novel Leaning Feed-Forward Controller for Accurate Robot Trajectory Tracking
This paper presents a novel learning feed-forward controller design approach for accurate robotics trajectory tracking. Based on the joint nonlinear dynamics characteristics, a mod...
D. Bi, G. L. Wang, Jun Zhang, Q. Xue
ADCS
2004
15 years 6 months ago
Phrases and Feature Selection in E-Mail Classification
In this paper we study the effectiveness of using a phrase-based representation in e-mail classification, and the affect this approach has on a number of machine learning algorithm...
Elisabeth Crawford, Irena Koprinska, Jon Patrick
ICML
2008
IEEE
16 years 6 months ago
On the quantitative analysis of deep belief networks
Deep Belief Networks (DBN's) are generative models that contain many layers of hidden variables. Efficient greedy algorithms for learning and approximate inference have allow...
Ruslan Salakhutdinov, Iain Murray
JMLR
2006
124views more  JMLR 2006»
15 years 5 months ago
Fast SDP Relaxations of Graph Cut Clustering, Transduction, and Other Combinatorial Problem
The rise of convex programming has changed the face of many research fields in recent years, machine learning being one of the ones that benefitted the most. A very recent develop...
Tijl De Bie, Nello Cristianini