Sciweavers

8381 search results - page 171 / 1677
» The security of machine learning
Sort
View
USENIX
2003
15 years 6 months ago
Learning Spam: Simple Techniques For Freely-Available Software
The problem of automatically filtering out spam e-mail using a classifier based on machine learning methods is of great recent interest. This paper gives an introduction to mach...
Bart Massey, Mick Thomure, Raya Budrevich, Scott L...
ITICSE
2009
ACM
15 years 11 months ago
Xen worlds: leveraging virtualization in distance education
The Xen Worlds project at Iowa State University was designed to provide a virtualized lab environment for the Information Assurance program. The large number of off-campus student...
Benjamin R. Anderson, Amy K. Joines, Thomas E. Dan...
ECTEL
2006
Springer
15 years 8 months ago
A Context-Model for Supporting Work-Integrated Learning
Abstract. This contribution introduces the so-called Workplace Learning Context as essential conceptualisation supporting self-directed learning experiences directly at the workpla...
Armin Ulbrich, Peter Scheir, Stefanie N. Lindstaed...
IUI
2000
ACM
15 years 9 months ago
APE: learning user's habits to automate repetitive tasks
The APE (Adaptive Programming Environment) project focuses on applying Machine Learning techniques to embed a software assistant into the VisualWorks Smalltalk interactive program...
Jean-David Ruvini, Christophe Dony
IJCNN
2008
IEEE
15 years 11 months ago
A formula of equations of states in singular learning machines
Abstract— Almost all learning machines used in computational intelligence are not regular but singular statistical models, because they are nonidentifiable and their Fisher info...
Sumio Watanabe