Sciweavers

8381 search results - page 170 / 1677
» The security of machine learning
Sort
View
137
Voted
ICALT
2009
IEEE
15 years 8 months ago
Automated Planning for Personalised Course Composition
Authoring tools for building Intelligent Educational Systems must provide support to ensure flexibility, adaptability of content to the user profile, reusability and sharing of le...
Antonio Garrido, Eva Onaindia, Oscar Sapena
ICML
2007
IEEE
16 years 5 months ago
Intractability and clustering with constraints
Clustering with constraints is a developing area of machine learning. Various papers have used constraints to enforce particular clusterings, seed clustering algorithms and even l...
Ian Davidson, S. S. Ravi
IUI
2000
ACM
15 years 9 months ago
A learning agent for wireless news access
We describe a user interface for wireless information devices, specifically designed to facilitate learning about users’ individual interests in daily news stories. User feedbac...
Daniel Billsus, Michael J. Pazzani, James Chen
SWAP
2008
15 years 6 months ago
Learning SHIQ+log Rules for Ontology Evolution
The definition of new concepts or roles for which extensional knowledge become available can turn out to be necessary to make a DL ontology evolve. In this paper we reformulate thi...
Francesca A. Lisi, Floriana Esposito
IMC
2009
ACM
15 years 11 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...