Machine Learning News-Ticker

Everything (almost) in the news dealing with: machine learning, data mining, text mining, genetic algorithms, reinforcement learning RSS feed for this site




Date Abstract Link / Source
Tue Feb 7 2006Software That Learns by Doing
Machine-learning techniques have been used to create self-improving software for decades, but recent advances are bringing these tools into the mainstream.
From http://www.computerworld.com
Tue Feb 7 2006Time to learn LISP
Lately, I've been noticing people in areas outside machine learning pick up neural nets to solve problems in their specific domain.
From http://blogs.zdnet.com
Tue Feb 7 2006Exotic Programming Tools Go Mainstream
PROLOG, neural nets and genetic algorithms are other technologies that programmers might mentally relegate to the AI (artificial intelligence) hype bubble of ...
From http://www.eweek.com
Sun Feb 5 2006Most Spying Targets No Longer Suspects
Successive stages of filtering grow more intrusive as artificial intelligence systems rank voice and data traffic in order of likeliest interest to human ...
From http://www.washingtonpost.com
Thu Feb 2 2006New generation of robots will walk, talk -- and wash up
When artificial intelligence catches up (with the advances), robots will not only be able to clean the house, do the dishes and take out the garbage, but ...
From http://www.timesonline.co.uk
Thu Feb 2 2006Data mining tells government and business a lot about you
You may never have heard the term "data mining," but it's at the core of the argument that's raging over government eavesdropping on Americans.
From http://www.mercurynews.com
Fri Jan 27 2006Sony Confirms Robot Shutdown, QUALIA Axed?
... but R&D for the elemental technologies (visual recognition, sound recognition, etc.) will continue for research on Artificial Intelligence.
From http://www.gizmodo.com
Mon Jan 23 2006IBM to Enhance Open Source Knowledge Discovery
to UIMA's flexible deployment options and UIMA users access to the many useful plug-ins already available in GATE for text mining, information extraction and ...
From http://www.ebizq.net
Sat Jan 21 2006Ignorance about data mining proves costly for private and public
The second day of "Data Mining for SMEs" began with insight into the ways in which data mining can stimulate business growth.
From http://www.itwales.com
Sat Jan 21 2006Math will Rock Your World
A generation ago, quants turned finance upside down. Now they're mapping out ad campaigns and building new businesses from mountains of personal data.
From http://www.businessweek.com
Wed Jan 18 2006Mining for kids: Children can't "opt out" of Pentagon
Krenke said the database is compiled using information from state motor vehicles departments, the Selective Service, and data-mining firms that collect and ...
From http://www.vermontguardian.com
Mon Jan 16 2006A genuine milestone for artificial intelligence
Robots have a reason to party: this year is the 50th anniversary of artificial intelligence. In 1956 John McCarthy, a scientist ...
From http://www.smh.com.au
Sat Jan 7 2006Xerox Taps Data Mining To Improve Sales Forecasts
Xerox Corp. has implemented data mining and predictive analysis software to improve sales forecasts and free up its sales force for more important tasks.
From http://www.informationweek.com
Sat Jan 7 2006Data Mining Amazon.com Wish Lists
In his article "Data Mining 101: Finding Subversives with Amazon Wishlists," Tom Owad of Applefritter outlines a way in which one could ...
From http://yro.slashdot.org
Wed Dec 28 2005Aptitude test: Data mining for recruiters?
"The fundamental problem is that it's a way of data mining for military recruiters," said Oskar Castro, an associate with the American Friends Service ...
From http://www.kentucky.com
Sun Dec 25 2005The Curious Section 126 of the Patriot Act
... General to submit a report to Congress "on any initiative of the Department of Justice that uses or is intended to develop pattern-based data-mining technology ...
From http://blogs.washingtonpost.com
Sun Dec 25 2005The future of online search
Search is one of the hardest computer science problems in the world, because basically we are trying to create artificial intelligence so that we can speak ...
From http://edition.cnn.com
Fri Dec 23 2005Honey bees recognise people
There are also big implications for the security industry and artificial intelligence, Srinivasan points out. "Face recognition is such a hard thing," he says.
From http://abc.net.au
Tue Dec 13 2005Using Particle Swarm Optimization for Offline Training in a Racing Game
In a racing game, for example, an external file may be used to specify the values for various physics parameters of a vehicle, or the behavioral parameters of an AI opponent. ... Deciding on values for these parameters can be a difficult task, since a change made to one parameter value might affect several aspects of behavior. ... Algorithms such as PSO and Genetic Algorithms (GA) are generally used on functions that take several input parameters and return a single output value.
From http://www.gamasutra.com
Thu Dec 1 2005Data mining software reveals fraudulent employee activity
... investigators have changed the way they access sales data so it can be run through the data mining software.
From http://www.vnunet.com
Thu Dec 1 2005Engineers required to service Google growth
Experience of machine learning, information retrieval and algorithmic manipulation will mark out the strongest candidates in Google's initial search for more ...
From http://www.itweek.co.uk
Sun Nov 27 2005Adwords vs. adCenter: The Personalization Factor
They immediately focused on years of profiling, user behavior, and data mining. ··· However, it doesn't help when it comes to data mining for personalization.
From http://www.clickz.com
Thu Nov 17 2005$1 Billion a Year Spent on Crime, Terrorism Technology
The report focuses on "dual-benefit" ISI technologies -- such as visualization and unstructured data mining tools -- that can also serve the multi-billion ...
From http://www.ksbitv.com
Thu Nov 17 2005Microsoft Expands Its Anti-Phishing Database
... information about phishing scams, combining third-party information with data that is user-generated, along with machine-learning technology that learns ...
From http://www.eweek.com
Wed Nov 16 2005Breakthrough in vitro screening for heart drugs
The company's Visible Discovery(tm) platform combines proprietary machine learning and signal processing techniques to deliver rich, unbiased insights from ...
From http://www.medicalnewstoday.com
Mon Nov 14 2005'ARTIFICIAL intelligence' gets smart
An AI technology based on evolutionary principles -- known as genetic algorithms -- helped NASA design three small satellites that will be launched in ...
From http://www.twincities.com
Thu Nov 10 2005New Skirmish in War Over 9/11 Information Center
According to at least five DOD employees, the controversial data-mining project, which ended in 2000, identified Mohamed Atta and other 9/11 hijackers a year ...
From http://www.globalresearch.ca
Thu Nov 10 2005Aga Looks at FBI Snooping
The data mining in Las Vegas arose again Sunday when The Washington Post in a front page article reported on FBI activities and its previously unknown policy ...
From http://www.casinocitytimes.com
Mon Nov 7 2005Computer Electronics Show attendees Big Brothered
... flight information, hotel information, and car rental info is currently sitting in an FBI database, part of a Las Vegas emergency data mining operation which ...
From http://www.theinquirer.net
Thu Nov 3 2005New Multimedia Search Finds Terabytes of Content on 'The Dark Web'
... proprietary technology includes a Bayesian filter with Markov chaining that is under development, as well as a machine learning mechanism, a wavelet ...
From http://sev.prnewswire.com
Mon Oct 31 2005Google Wants to Dominate Madison Avenue, Too
... In a fraction of a second, it can evaluate millions of variables about its users and advertisers, correlate them with its potential database of billions of ads and deliver the message to which each user is most likely to respond. ...
From http://www.nytimes.com
Wed Oct 26 2005Automated analysis of security-sensitive protocols
...enables a security protocol designer to input the protocol and the language he/she wishes to use, then feeds back information on this protocol including any known bugs or security weaknesses," says ...
From http://istresults.cordis.lu
Mon Oct 24 2005Machines are catching up to human intelligence
An AI technology based on evolutionary principles - known as genetic algorithms - helped NASA design three small satellites that will be launched in February ...
From http://www.mercurynews.com
Tue Oct 11 2005Majorspot Releases Its New AI Tool for Discovering Compromised Website User Accounts
Investigator XT is an artificial intelligence agent that applies algorithms from its open source Majorspot Software Development Kit (SDK) to discover users who ... According to recent reports, surfers are increasingly sharing passwords to gain access to online content, threatening the bottom line of most web site operators.
From http://www.emediawire.com
Mon Oct 10 2005PH.D. students plan for a difficult job market
... Kevin Gold GRD '09, a computer science graduate student focusing in artificial intelligence, said academic jobs in machine learning techniques -- his area of ...
From http://www.yaledailynews.com
Thu Oct 6 2005Reading in the Age of Google
Emerging technologies for summarization, question answering, information retrieval, text mining, and visualization now can provide more immediate support for ...
From http://www.neh.fed.us
Wed Oct 5 2005Legal - Artificial intelligence: threats and opportunities
... There are going to be a lot of showdowns.". Further into the future is the issue of artificial intelligence. "
From http://www.legalit.net
Mon Oct 3 2005Traffic Taming
... uses Bayesian machine learning algorithms to make statistical inferences and predictions about traffic, based on variables such as weather conditions ...
From http://www.technologyreview.com
Fri Sep 30 2005How to Buy Data Mining: A Framework for Avoiding Costly Project
... adapt their data mining project design to a blend of their perception of what data mining is with a standard corporate practice for evaluating and purchasing products and services.
From http://www.dmreview.com
Thu Sep 29 2005Good Reception: Using Cell Phones to Predict Behavior
By leveraging machine learning, the Reality Mining experiment is creating models that can be used to predict what a single user will do next, as well as model ... See also:Machine Perception and Learning of Complex Social Systems
From http://www.econtentmag.com
Tue Sep 27 2005Can Biomarker Initiatives Stay on Target?
For example, mass spectra can be analyzed through machine learning and various computer algorithms to identify sets of peaks that distinguish between...  
From http://www.the-scientist.com
Fri Sep 23 2005AI systems may blow weathermen away
Weather forecasters could find themselves pushed out of a job by an artificial intelligence system designed to write clearer, less ambiguous reports.
From http://www.newscientist.com
Wed Sep 21 2005Senators grill witnesses on data mining
... blasted the Pentagon for failing to supply clear answers about--or witnesses with intimate knowledge of--a data-mining endeavor believed to have ...
From http://news.zdnet.com
Mon Sep 19 2005Have you StumbledUpon this?
The people-driven technology combines human recommendations with machine learning of personal preferences and interests to filter through the vast amount of ...
From http://www.irishdev.com
Sat Sep 17 2005Tech Sniffs Out Bad Meat
Software designed to read the spectrum then determines whether the meat is bad. The researchers created the software using genetic algorithms.
From http://www.wired.com
Wed Sep 14 2005Researchers turn keyboard clicks into text
... how they developed software that could analyze the sound of someone typing on a keyboard for just 10 minutes and then piece together as much as 96 percent of what had been typed.
From http://www.pcworld.idg.com.au
Fri Sep 9 2005Police use software to predict recidivism
"Our text mining solution is based on over 25 years' research into natural language processing,"...
From http://www.vnunet.com
Wed Sep 7 2005Evolution as good as quantum equations
... design rules which engineers can use to make use of the latest semiconductor device technology could be tackled by employing genetic algorithms to develop ...
From http://www.electronicsweekly.com
Tue Sep 6 2005Artificial intelligence to help intensive care doctors
A team of systems engineers from the University of Sheffield is developing an intelligent computer system which imitates a doctor's ...
From http://www.rxpgnews.com
Fri Sep 2 2005New AI Chip Would Make Games Smarter
ATI and Nvidia spun off from the need for dedicated graphics accelerators, gamers have complained for years that the artificial intelligence, or coding ...
From http://www.extremetech.com
Mon Aug 29 2005Data Mining Found to Flunk Privacy Rules
None of five federal agencies using electronic data mining to track terrorists, catch criminals or prevent fraud complied with all rules for gathering citizen ...
From http://www.sfgate.com
Thu Aug 25 2005Automatically Classifying the Mood of Blog Posts
It reports on exploratory research to automatically (using machine learning) classify blog text based on the mood of the author.
From http://blog.searchenginewatch.com
Thu Aug 18 2005Insight into the processes of 'positive' and 'negative' learners
... our findings provide valuable constraints toward advancing theoretical perspectives on the role of the ERN in reinforcement learning and decision ...
From http://www.eurekalert.org
Thu Aug 18 2005University of Colorado at Boulder Researchers Pinpoint Brain
... were first predicted by a computer model developed by Frank that shows how different parts of the brain are engaged during reinforcement learning and decision ...
From http://newswire.ascribe.org
Wed Aug 17 2005Technology to thwart food poisoning
Carnegie Mellon University are working with various government offices to develop a "spatiotemporal" data mining system for finding and ...
From http://news.com.com
Mon Aug 15 2005A wasted opportunity in war on terror
That technology is ''data mining," the use of sophisticated software and powerful computers to spot patterns of activity hidden in vast amounts of apparently ...
From http://www.boston.com
Mon Aug 15 2005Carnegie Mellon cyLab researchers work to develop new red tide monitoring
... developing software that will monitor dangerous algae and various biochemical anomalies for public health ... It is a rapidly growing field, which includes inverse physics, machine learning and human-computer interaction," Cai said.
From http://www.eurekalert.org
Mon Aug 15 2005Advertising Sci-Fi Becoming Reality
... super-segmentation to find target audiences, psychology and research to find hot buttons that trigger certain behaviors, "machine-learning" techniques to ...
From http://www.marketingvox.com
Mon Aug 15 2005The Real Deal On Microsoft's Playlist Patent
The patent was filed by Microsoft's John Platt, an expert in machine learning, which is essentially technology that learns ...
From http://www.forbes.com
Mon Aug 15 2005I See What You're Signing
consists of a miniature video camera and wrist-mounted accelerometers to pick up a person's signs and software-based machine learning techniquesto interpret ...
From http://www.spectrum.ieee.org
Page 1 2 3 4 5 6 7 8 9 10





This is my little news-ticker for news in machine learning, artificial intelligence and data mining. It is generated for your and my own convenience in a semi-automated fashion from various sources that I check with search engines and is updated (somewhat) frequently. If you find any problems, or if I missed out on something really interesting, send me an email. My comments are in italics.


RSS-Feed for this News-Ticker: RSS feed for this site

Back to the top   [Sitemap]

This page is Copyright © Markus Breitenbach 2010. All rights reserved. Any opinions expressed here are my own and might not reflect my employers opinion.
[This page: http://markus-breitenbach.com/machine_learning_news8.php was last modified: October 24 2016 01:18:03.]   [Home].   Email me