Sciweavers

1455 search results - page 172 / 291
» Exploiting Myopic Learning
Sort
View
TKDE
2008
116views more  TKDE 2008»
15 years 4 months ago
Long-Term Cross-Session Relevance Feedback Using Virtual Features
Relevance feedback (RF) is an iterative process, which refines the retrievals by utilizing the user's feedback on previously retrieved results. Traditional RF techniques solel...
Peng-Yeng Yin, Bir Bhanu, Kuang-Cheng Chang, Anlei...
COLING
2002
15 years 3 months ago
Inducing Information Extraction Systems for New Languages via Cross-language Projection
Information extraction (IE) systems are costly to build because they require development texts, parsing tools, and specialized dictionaries for each application domain and each na...
Ellen Riloff, Charles Schafer, David Yarowsky
MVA
2010
181views Computer Vision» more  MVA 2010»
15 years 2 months ago
Human action detection via boosted local motion histograms
This paper presents a novel learning method for human action detection in video sequences. The detecting problem is not limited in controlled settings like stationary background or...
Qingshan Luo, Xiaodong Kong, Guihua Zeng, Jianping...
COLT
2010
Springer
15 years 2 months ago
An Asymptotically Optimal Bandit Algorithm for Bounded Support Models
Multiarmed bandit problem is a typical example of a dilemma between exploration and exploitation in reinforcement learning. This problem is expressed as a model of a gambler playi...
Junya Honda, Akimichi Takemura
CORR
2011
Springer
273views Education» more  CORR 2011»
14 years 11 months ago
Natural Language Processing (almost) from Scratch
We propose a unified neural network architecture and learning algorithm that can be applied to various natural language processing tasks including: part-of-speech tagging, chunki...
Ronan Collobert, Jason Weston, Léon Bottou,...