Sciweavers

8381 search results - page 66 / 1677
» The security of machine learning
Sort
View
112
Voted
ICML
2003
IEEE
16 years 6 months ago
Characteristics of Long-term Learning in Soar and its Application to the Utility Problem
William G. Kennedy, Kenneth A. De Jong
ICML
1998
IEEE
16 years 6 months ago
Ridge Regression Learning Algorithm in Dual Variables
Craig Saunders, Alexander Gammerman, Volodya Vovk
SIGOPS
2008
146views more  SIGOPS 2008»
15 years 5 months ago
Vigilant: out-of-band detection of failures in virtual machines
What do our computer systems do all day? How do we make sure they continue doing it when failures occur? Traditional approaches to answering these questions often involve inband m...
Dan Pelleg, Muli Ben-Yehuda, Richard Harper, Lisa ...
143
Voted
ACSAC
2005
IEEE
15 years 11 months ago
Generating Policies for Defense in Depth
Coordinating multiple overlapping defense mechat differing levels of abstraction, is fraught with the potential for misconfiguration, so there is strong motivation to generate p...
Paul Rubel, Michael Ihde, Steven Harp, Charles Pay...
AGENTS
2001
Springer
15 years 9 months ago
Collaborative multiagent learning for classification tasks
Multiagent learning di ers from standard machine learning in that most existing learning methods assume that all knowledge is available locally in a single agent. In multiagent sy...
Pragnesh Jay Modi, Wei-Min Shen