Sciweavers

3556 search results - page 257 / 712
» Can machine learning be secure
Sort
View
196
Voted
WONTO
2008
15 years 6 months ago
A Survey of Ontology Learning Procedures
Abstract. Ontologies constitute an approach for knowledge representation that can be shared establishing a shared vocabulary for different applications and are also the backbone of...
Lucas Drumond, Rosario Girardi
JMLR
2006
131views more  JMLR 2006»
15 years 5 months ago
Incremental Support Vector Learning: Analysis, Implementation and Applications
Incremental Support Vector Machines (SVM) are instrumental in practical applications of online learning. This work focuses on the design and analysis of efficient incremental SVM ...
Pavel Laskov, Christian Gehl, Stefan Krüger, ...
164
Voted
ICML
2007
IEEE
16 years 6 months ago
Dimensionality reduction and generalization
In this paper we investigate the regularization property of Kernel Principal Component Analysis (KPCA), by studying its application as a preprocessing step to supervised learning ...
Sofia Mosci, Lorenzo Rosasco, Alessandro Verri
150
Voted
ICML
2007
IEEE
16 years 6 months ago
Map building without localization by dimensionality reduction techniques
This paper proposes a new map building framework for mobile robot named Localization-Free Mapping by Dimensionality Reduction (LFMDR). In this framework, the robot map building is...
Takehisa Yairi
175
Voted
ICML
2007
IEEE
16 years 6 months ago
Gradient boosting for kernelized output spaces
A general framework is proposed for gradient boosting in supervised learning problems where the loss function is defined using a kernel over the output space. It extends boosting ...
Florence d'Alché-Buc, Louis Wehenkel, Pierr...