Sciweavers

8381 search results - page 187 / 1677
» The security of machine learning
Sort
View
ICALT
2005
IEEE
15 years 10 months ago
Towards Grid Services for a Virtual Research Environment
Gary B. Wills, Lester Gilbert, Quintin Gee, Hugh C...
143
Voted
COLT
1994
Springer
15 years 9 months ago
Playing the Matching-Shoulders Lob-Pass Game with Logarithmic Regret
The best previous algorithmfor the matching shoulders lob-pass game, Abe and Takeuchi's (1993)ARTHUR, suffered O(t1
Joe Kilian, Kevin J. Lang, Barak A. Pearlmutter
164
Voted
COLT
2004
Springer
15 years 8 months ago
Model Selection by Bootstrap Penalization for Classification
We consider the binary classification problem. Given an i.i.d. sample drawn from the distribution of an X
Magalie Fromont
COLT
2006
Springer
15 years 8 months ago
Mercer's Theorem, Feature Maps, and Smoothing
We study Mercer's theorem and feature maps for several positive definite kernels that are widely used in practice. The smoothing properties of these kernels will also be explo...
Ha Quang Minh, Partha Niyogi, Yuan Yao
EACL
2006
ACL Anthology
15 years 6 months ago
Semantic Role Labeling for Coreference Resolution
Extending a machine learning based coreference resolution system with a feature capturing automatically generated information about semantic roles improves its performance.
Simone Paolo Ponzetto, Michael Strube