Sciweavers

8381 search results - page 158 / 1677
» The security of machine learning
Sort
View
CGO
2009
IEEE
15 years 11 months ago
Automatic Feature Generation for Machine Learning Based Optimizing Compilation
Recent work has shown that machine learning can automate and in some cases outperform hand crafted compiler optimizations. Central to such an approach is that machine learning tec...
Hugh Leather, Edwin V. Bonilla, Michael O'Boyle
FOCI
2007
IEEE
15 years 11 months ago
Almost All Learning Machines are Singular
— A learning machine is called singular if its Fisher information matrix is singular. Almost all learning machines used in information processing are singular, for example, layer...
Sumio Watanabe
GIS
2009
ACM
15 years 9 months ago
Machine learning approach to report prioritization with an application to travel time dissemination
This paper looks at the problem of data prioritization, commonly found in mobile ad-hoc networks. The proposed general solution uses a machine learning approach in order to learn ...
Piotr Szczurek, Bo Xu, Jie Lin, Ouri Wolfson
AI
2007
Springer
15 years 5 months ago
Argument based machine learning
We present a novel approach to machine learning, called ABML (argumentation based ML). This approach combines machine learning from examples with concepts from the field of argum...
Martin Mozina, Jure Zabkar, Ivan Bratko
ECML
1998
Springer
15 years 9 months ago
Learning to Classify X-Ray Images Using Relational Learning
: Image understanding often requires extensive background knowledge. The problem addressed in this paper is such knowledge can be acquired. We discuss how relational machine learni...
Claude Sammut, Tatjana Zrimec