Sciweavers

1614 search results - page 189 / 323
» Learning Rules and Their Exceptions
Sort
View
CCS
2003
ACM
15 years 8 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
116
Voted
IUI
2005
ACM
15 years 9 months ago
Adaptive teaching strategy for online learning
Finding the optimal teaching strategy for an individual student is difficult even for an experienced teacher. Identifying and incorporating multiple optimal teaching strategies fo...
Jungsoon P. Yoo, Cen Li, Chrisila C. Pettey
DSMML
2004
Springer
15 years 8 months ago
SVM Based Learning System for Information Extraction
Abstract. We present an SVM-based learning algorithm for information extraction, including experiments on the influence of different algorithm settings. Our approach needs fewer ...
Yaoyong Li, Kalina Bontcheva, Hamish Cunningham
135
Voted
AAAI
2000
15 years 4 months ago
Inter-Layer Learning Towards Emergent Cooperative Behavior
As applications for artificially intelligent agents increase in complexity we can no longer rely on clever heuristics and hand-tuned behaviors to develop their programming. Even t...
Shawn Arseneau, Wei Sun, Changpeng Zhao, Jeremy R....
COGSCI
2004
106views more  COGSCI 2004»
15 years 3 months ago
Can musical transformations be implicitly learned?
The dominant theory of what people can learn implicitly is that they learn chunks of adjacent elements in sequences. A type of musical grammar that goes beyond specifying allowabl...
Zoltan Dienes, H. Christopher Longuet-Higgins