Sciweavers

3556 search results - page 261 / 712
» Can machine learning be secure
Sort
View
132
Voted
COLT
2007
Springer
15 years 11 months ago
Occam's Hammer
Abstract. We establish a generic theoretical tool to construct probabilistic bounds for algorithms where the output is a subset of objects from an initial pool of candidates (or mo...
Gilles Blanchard, François Fleuret
ECML
2007
Springer
15 years 11 months ago
Neighborhood-Based Local Sensitivity
Abstract. We introduce a nonparametric model for sensitivity estimation which relies on generating points similar to the prediction point using its k nearest neighbors. Unlike most...
Paul N. Bennett
ECML
2007
Springer
15 years 11 months ago
Using Text Mining and Link Analysis for Software Mining
Many data mining techniques are these days in use for ontology learning – text mining, Web mining, graph mining, link analysis, relational data mining, and so on. In the current ...
Miha Grcar, Marko Grobelnik, Dunja Mladenic
ICALT
2006
IEEE
15 years 11 months ago
Agency Architecture for Teacher Intervention in Robotics Classes
Teachers working in robotics classes face a major problem: how to keep track on individual students’ or even small groups’ progress in a class of 30-40 students. An agency app...
Ilkka Jormanainen, Yuejun Zhang, Erkki Sutinen, Ki...
ATAL
2005
Springer
15 years 11 months ago
Personalisation for user agents
This paper is concerned with personalisation of user agents by symbolic, on-line machine learning techniques. The application of these ideas to an infotainment agent is discussed ...
Joshua J. Cole, Matt J. Gray, John W. Lloyd, Kee S...