Sciweavers

3556 search results - page 62 / 712
» Can machine learning be secure
Sort
View
145
Voted
NLPRS
2001
Springer
15 years 5 months ago
Named Entity Recognition using Machine Learning Methods and Pattern-Selection Rules
Named Entity recognition, as a task of providing important semantic information, is a critical first step in Information Extraction and QuestionAnswering system. This paper propos...
Choong-Nyoung Seon, Youngjoong Ko, Jeong-Seok Kim,...
89
Voted
ACL
2006
15 years 2 months ago
Using Machine-Learning to Assign Function Labels to Parser Output for Spanish
Data-driven grammatical function tag assignment has been studied for English using the Penn-II Treebank data. In this paper we address the question of whether such methods can be ...
Grzegorz Chrupala, Josef van Genabith
92
Voted
DATAMINE
2006
139views more  DATAMINE 2006»
15 years 1 months ago
VizRank: Data Visualization Guided by Machine Learning
Data visualization plays a crucial role in identifying interesting patterns in exploratory data analysis. Its use is, however, made difficult by the large number of possible data p...
Gregor Leban, Blaz Zupan, Gaj Vidmar, Ivan Bratko
127
Voted
JMLR
2010
143views more  JMLR 2010»
14 years 11 months ago
A Quasi-Newton Approach to Nonsmooth Convex Optimization Problems in Machine Learning
We extend the well-known BFGS quasi-Newton method and its memory-limited variant LBFGS to the optimization of nonsmooth convex objectives. This is done in a rigorous fashion by ge...
Jin Yu, S. V. N. Vishwanathan, Simon Günter, ...
83
Voted
ACSAC
2006
IEEE
15 years 7 months ago
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy
In this paper we examine the problem of entering sensitive data, such as passwords, from an untrusted machine. By untrusted we mean that it is suspected to be infected with spywar...
Dinei A. F. Florêncio, Cormac Herley