Sciweavers

8381 search results - page 66 / 1677
» The security of machine learning
Sort
View
75
Voted
ICML
2003
IEEE
16 years 1 months ago
Characteristics of Long-term Learning in Soar and its Application to the Utility Problem
William G. Kennedy, Kenneth A. De Jong
83
Voted
ICML
1998
IEEE
16 years 1 months ago
Ridge Regression Learning Algorithm in Dual Variables
Craig Saunders, Alexander Gammerman, Volodya Vovk
SIGOPS
2008
146views more  SIGOPS 2008»
15 years 14 days ago
Vigilant: out-of-band detection of failures in virtual machines
What do our computer systems do all day? How do we make sure they continue doing it when failures occur? Traditional approaches to answering these questions often involve inband m...
Dan Pelleg, Muli Ben-Yehuda, Richard Harper, Lisa ...
97
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Generating Policies for Defense in Depth
Coordinating multiple overlapping defense mechat differing levels of abstraction, is fraught with the potential for misconfiguration, so there is strong motivation to generate p...
Paul Rubel, Michael Ihde, Steven Harp, Charles Pay...
124
Voted
AGENTS
2001
Springer
15 years 4 months ago
Collaborative multiagent learning for classification tasks
Multiagent learning di ers from standard machine learning in that most existing learning methods assume that all knowledge is available locally in a single agent. In multiagent sy...
Pragnesh Jay Modi, Wei-Min Shen