Sciweavers

1204 search results - page 49 / 241
» Using Machine Learning Techniques for Stylometry
Sort
View
ICANN
2010
Springer
15 years 2 months ago
Policy Gradients for Cryptanalysis
So-called Physical Unclonable Functions are an emerging, new cryptographic and security primitive. They can potentially replace secret binary keys in vulnerable hardware systems an...
Frank Sehnke, Christian Osendorfer, Jan Sölte...
JMLR
2006
108views more  JMLR 2006»
15 years 1 months ago
The Interplay of Optimization and Machine Learning Research
The fields of machine learning and mathematical programming are increasingly intertwined. Optimization problems lie at the heart of most machine learning approaches. The Special T...
Kristin P. Bennett, Emilio Parrado-Hernánde...
IJCAI
1997
15 years 2 months ago
Combining Knowledge Acquisition and Machine Learning to Control Dynamic Systems
This paper presents an interactive method for building a controller for dynamic systems by using a combination of knowledge acquisition and machine learning techniques. The aim is...
G. M. Shiraz, Claude Sammut
IJIIDS
2008
201views more  IJIIDS 2008»
15 years 1 months ago
MALEF: Framework for distributed machine learning and data mining
: Growing importance of distributed data mining techniques has recently attracted attention of researchers in multiagent domain. Several agent-based application have been already c...
Jan Tozicka, Michael Rovatsos, Michal Pechoucek, S...
ECML
2007
Springer
15 years 7 months ago
Graph-Based Domain Mapping for Transfer Learning in General Games
A general game player is an agent capable of taking as input a description of a game’s rules in a formal language and proceeding to play without any subsequent human input. To do...
Gregory Kuhlmann, Peter Stone