Sciweavers

8381 search results - page 167 / 1677
» The security of machine learning
Sort
View
MOBISYS
2008
ACM
16 years 4 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
CHI
2008
ACM
16 years 5 months ago
Investigating statistical machine learning as a tool for software development
As statistical machine learning algorithms and techniques continue to mature, many researchers and developers see statistical machine learning not only as a topic of expert study,...
Kayur Patel, James Fogarty, James A. Landay, Bever...
148
Voted
JMLR
2006
108views more  JMLR 2006»
15 years 4 months ago
The Interplay of Optimization and Machine Learning Research
The fields of machine learning and mathematical programming are increasingly intertwined. Optimization problems lie at the heart of most machine learning approaches. The Special T...
Kristin P. Bennett, Emilio Parrado-Hernánde...
148
Voted
ICML
2000
IEEE
16 years 5 months ago
Crafting Papers on Machine Learning
This essay gives advice to authors of papers on machine learning, although much of it carries over to other computational disciplines. The issues covered include the material that...
Pat Langley
164
Voted
ICML
2000
IEEE
15 years 9 months ago
Using Knowledge to Speed Learning: A Comparison of Knowledge-based Cascade-correlation and Multi-task Learning
Cognitive modeling with neural networks unrealistically ignores the role of knowledge in learning by starting from random weights. It is likely that effective use of knowledge by ...
Thomas R. Shultz, François Rivest