Sciweavers

3556 search results - page 271 / 712
» Can machine learning be secure
Sort
View
ICML
2005
IEEE
16 years 6 months ago
Linear Asymmetric Classifier for cascade detectors
The detection of faces in images is fundamentally a rare event detection problem. Cascade classifiers provide an efficient computational solution, by leveraging the asymmetry in t...
Jianxin Wu, Matthew D. Mullin, James M. Rehg
ICALT
2005
IEEE
15 years 11 months ago
Predicting Students' Marks in Hellenic Open University
The ability to provide assistance for a student at the appropriate level is invaluable in the learning process. Not only does it aid the student’s learning process but also prev...
Sotiris B. Kotsiantis, Panayiotis E. Pintelas
ICALT
2003
IEEE
15 years 10 months ago
Adaptive Exploration of Assessment Results under Uncertainty
In the context of Intelligent Learning Environments (ILE), adaptivity plays a key role. In order to achieve adaptive behavior an ILE should have a rich representation of the learn...
Dimitris Lamboudis, Anastasios A. Economides, Anas...
ML
2008
ACM
134views Machine Learning» more  ML 2008»
15 years 5 months ago
Multilabel classification via calibrated label ranking
Label ranking studies the problem of learning a mapping from instances to rankings over a predefined set of labels. Hitherto existing approaches to label ranking implicitly operat...
Johannes Fürnkranz, Eyke Hüllermeier, En...
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
15 years 11 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner