Sciweavers

8381 search results - page 1578 / 1677
» The security of machine learning
Sort
View
98
Voted
ATAL
2011
Springer
14 years 18 days ago
Maximum causal entropy correlated equilibria for Markov games
Motivated by a machine learning perspective—that gametheoretic equilibria constraints should serve as guidelines for predicting agents’ strategies, we introduce maximum causal...
Brian D. Ziebart, J. Andrew Bagnell, Anind K. Dey
108
Voted
ATAL
2011
Springer
14 years 18 days ago
Online anomaly detection in unmanned vehicles
Autonomy requires robustness. The use of unmanned (autonomous) vehicles is appealing for tasks which are dangerous or dull. However, increased reliance on autonomous robots increa...
Eliahu Khalastchi, Gal A. Kaminka, Meir Kalech, Ra...
264
Voted
ECWEB
2011
Springer
277views ECommerce» more  ECWEB 2011»
14 years 11 days ago
Trust-Based Selection of Partners
The community of multi-agent systems has been studying ways to improve the selection of partner agents for joint action. One of such approaches consists in estimating the trustwort...
Joana Urbano, Ana Paula Rocha, Eugénio C. O...
EMNLP
2011
14 years 10 days ago
Inducing Sentence Structure from Parallel Corpora for Reordering
When translating among languages that differ substantially in word order, machine translation (MT) systems benefit from syntactic preordering—an approach that uses features fro...
John DeNero, Jakob Uszkoreit
ICDAR
2011
IEEE
14 years 6 days ago
Functional-Based Table Category Identification in Digital Library
– Better understanding the document logical components is crucial to many applications, e.g., document classification or data integration. As the development of digital libraries...
Seongchan Kim, Ying Liu
« Prev « First page 1578 / 1677 Last » Next »