Sciweavers

3556 search results - page 276 / 712
» Can machine learning be secure
Sort
View
ICML
2002
IEEE
16 years 6 months ago
Reinforcement Learning and Shaping: Encouraging Intended Behaviors
We explore dynamic shaping to integrate our prior beliefs of the final policy into a conventional reinforcement learning system. Shaping provides a positive or negative artificial...
Adam Laud, Gerald DeJong
ALT
2006
Springer
16 years 2 months ago
How Many Query Superpositions Are Needed to Learn?
Abstract. This paper introduces a framework for quantum exact learning via queries, the so-called quantum protocol. It is shown that usual protocols in the classical learning setti...
Jorge Castro
EWLR
1997
Springer
15 years 9 months ago
Learning Complex Robot Behaviours by Evolutionary Computing with Task Decomposition
Building robots can be a tough job because the designer has to predict the interactions between the robot and the environment as well as to deal with them. One solution to cope the...
Wei-Po Lee, John Hallam, Henrik Hautop Lund
EUROCOLT
1995
Springer
15 years 9 months ago
The structure of intrinsic complexity of learning
Limiting identification of r.e. indexes for r.e. languages (from a presentation of elements of the language) and limiting identification of programs for computable functions (fr...
Sanjay Jain, Arun Sharma
ECTEL
2008
Springer
15 years 7 months ago
Evaluation of Interoperability between MOT and Regular Learning Management Systems
Abstract. Adaptive Hypermedia content offers personalization; however, (re)using such material with regular Learning Management Systems (LMS) is not yet straightforward. Ideally, m...
Fawaz Ghali, Alexandra I. Cristea