Sciweavers

8381 search results - page 174 / 1677
» The security of machine learning
Sort
View
ICDM
2005
IEEE
163views Data Mining» more  ICDM 2005»
15 years 10 months ago
Balancing Exploration and Exploitation: A New Algorithm for Active Machine Learning
Active machine learning algorithms are used when large numbers of unlabeled examples are available and getting labels for them is costly (e.g. requiring consulting a human expert)...
Thomas Takeo Osugi, Kun Deng, Stephen D. Scott
ICMCS
2005
IEEE
221views Multimedia» more  ICMCS 2005»
15 years 10 months ago
A Multiple Instance Learning Approach for Content Based Image Retrieval Using One-Class Support Vector Machine
Multiple Instance Learning (MIL) is a special kind of supervised learning problem that has been studied actively in recent years. In this paper, we propose an approach based on On...
Chengcui Zhang, Xin Chen, Min Chen, Shu-Ching Chen...
147
Voted
JMLR
2010
123views more  JMLR 2010»
14 years 11 months ago
Inductive Principles for Restricted Boltzmann Machine Learning
Recent research has seen the proposal of several new inductive principles designed specifically to avoid the problems associated with maximum likelihood learning in models with in...
Benjamin Marlin, Kevin Swersky, Bo Chen, Nando de ...
ICML
2008
IEEE
16 years 5 months ago
Composite kernel learning
The Support Vector Machine (SVM) is an acknowledged powerful tool for building classifiers, but it lacks flexibility, in the sense that the kernel is chosen prior to learning. Mul...
Marie Szafranski, Yves Grandvalet, Alain Rakotomam...
ICML
2008
IEEE
16 years 5 months ago
Classification using discriminative restricted Boltzmann machines
Recently, many applications for Restricted Boltzmann Machines (RBMs) have been developed for a large variety of learning problems. However, RBMs are usually used as feature extrac...
Hugo Larochelle, Yoshua Bengio