Sciweavers

3556 search results - page 273 / 712
» Can machine learning be secure
Sort
View
ECML
2007
Springer
15 years 11 months ago
Conceptual Clustering Applied to Ontologies
Abstract. A clustering method is presented which can be applied to semantically annotated resources in the context of ontological knowledge bases. This method can be used to discov...
Floriana Esposito, Nicola Fanizzi, Claudia d'Amato
ICALT
2003
IEEE
15 years 10 months ago
On Tools for Analysis of Collaborative Problem Solving
Analysis of collaborative problem solving involves analysis of dialogue and interaction, analysis of tasks and social roles through ethnographic and other field studies. Use of to...
Nikolaos M. Avouris, Vassilis Komis, Georgios Fiot...
ECML
1998
Springer
15 years 9 months ago
A Monotonic Measure for Optimal Feature Selection
Feature selection is a problem of choosing a subset of relevant features. Researchers have been searching for optimal feature selection methods. `Branch and Bound' and Focus a...
Huan Liu, Hiroshi Motoda, Manoranjan Dash
151
Voted
ICML
1994
IEEE
15 years 9 months ago
Revision of Production System Rule-Bases
We describe CLIPS-R, a theory revision system for the revision of CLIPS rule-bases. CLIPS-R differs from previous theory revision systems in that it operates on forward chaining p...
Patrick M. Murphy, Michael J. Pazzani
KBSE
2005
IEEE
15 years 11 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra