A snapshot on nonstandard supervised learning problems: taxonomy, relationships, problem transformations and algorithm adaptations
نویسندگان
چکیده
منابع مشابه
A Taxonomy for Semi-Supervised Learning Methods
The semi-supervised learning (SSL) problem has recently drawn large attention in the machine learning community, mainly due to its significant importance in practical applications. In this paper, we review some existing methods, thereby isolating important general concepts of this new paradigm, and relating it with more traditional ones. In statistical machine learning, methods are divided in u...
متن کاملthe effects of multiple intelligences (focus on musical, visual, and linguistic) and direct instruction on learning grammar: a case on iranian efl students at elementary level
1.0 overview it seems that grammar plays a crucial role in the area of second and foreign language learning and widely has been acknowledged in grammar research. in other words, teaching grammar is an issue which has attracted much attention to itself, and a lot of teachers argue about the existence of grammar in language teaching and learning. this issue will remind us a famous sentence f...
Problem Transformations and Algorithm Selection for CSPs
A constraint satisfaction problem (CSP) provides a powerful paradigm to model a large number of practical problems such as scheduling, planning, vehicle routing, configuration, network design, routing and wavelength assignment. An instance of a CSP is represented by a set of variables, each of which can be assigned a value from its domain. The assignments to the variables must be consistent wit...
متن کاملA Prototype Patterns Selection Algorithm Based on Semi-supervised Learning
Semantic role labeling (SRL) is a fundamental task in natural language processing to find a sentence-level semantic representation. At present, the mainstream studies of semantic role labeling focus on the use of a variety of statistical machine learning techniques. But it difficult to obtain high quality labeled data. To solve the problem, we proposed a novel prototype patterns selection algor...
متن کاملA Taxonomy of Obfuscating Transformations
It has become more and more common to distribute software in forms that retain most or all of the information present in the original source code. An important example is Java bytecode. Since such codes are easy to decompile, they increase the risk of malicious reverse engineering attacks. In this paper we review several techniques for technical protection of software secrets. We will argue tha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Progress in Artificial Intelligence
سال: 2018
ISSN: 2192-6352,2192-6360
DOI: 10.1007/s13748-018-00167-7