Sciweavers

8381 search results - page 137 / 1677
» The security of machine learning
Sort
View
172
Voted
ESORICS
2011
Springer
14 years 4 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
AGENTS
2000
Springer
15 years 9 months ago
BoB: an interactive improvisational music companion
This paper introduces a new domain for believable agents (BA) and presents novel methods for dealing with the unique challenges that arise therein. The domain is providing improvi...
Belinda Thom
EMNLP
2004
15 years 6 months ago
Learning Hebrew Roots: Machine Learning with Linguistic Constraints
The morphology of Semitic languages is unique in the sense that the major word-formation mechanism is an inherently non-concatenative process of interdigitation, whereby two morph...
Ezra Daya, Dan Roth, Shuly Wintner
KDD
1995
ACM
148views Data Mining» more  KDD 1995»
15 years 8 months ago
Learning Arbiter and Combiner Trees from Partitioned Data for Scaling Machine Learning
Knowledge discovery in databases has become an increasingly important research topic with the advent of wide area network computing. One of the crucial problems we study in this p...
Philip K. Chan, Salvatore J. Stolfo
ISMB
1993
15 years 5 months ago
Knowledge-Based Generation of Machine-Learning Experiments: Learning with DNA Crystallography Data
Thoughit has been possible in the past to learn to predict DNAhydration patterns from crystallographic data, there is ambiguity in the choice of training data (both in terms of th...
Dawn M. Cohen, Casimir A. Kulikowski, Helen Berman