skip to main content
10.1145/1143844acmotherconferencesBook PagePublication PagesicmlConference Proceedingsconference-collections
ICML '06: Proceedings of the 23rd international conference on Machine learning
ACM2006 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
Pittsburgh Pennsylvania USA June 25 - 29, 2006
ISBN:
978-1-59593-383-6
Published:
25 June 2006

Bibliometrics
Skip Abstract Section
Abstract

This volume, which is also available from http://www.machinelearning.org, the home page of the International Machine Learning Society, contains the technical papers accepted for presentation at ICML-2006, the 23rd International Conference on Machine Learning. ICML is an international forum for presentation and discussion of the latest results in the field of machine learning. This year, ICML was held at Carnegie Mellon University, in Pittsburgh, Pennsylvania, and was co-located with COLT-2006, the 19th Annual Conference on Computational Learning Theory.Coincidentally, Carnegie Mellon University was also the venue for the first ICML---the First Machine Learning Workshop, which was held in 1980. Instead of proceedings, a book was published (Machine Learning: an Artificial Intelligence Approach, ed. Michalski, Carbonell, and Mitchell, Morgan Kaufman, 1983) containing sixteen research papers, and also a "comprehensive bibliography" of the field of machine learning, as it stood in 1983. This bibliography contained 572 entries.In 2006, no less than 548 papers were submitted to ICML---nearly as many as were in the "comprehensive bibliography" published with the papers from the first ICML. These papers were subjected to a thorough review process. In the first round of reviewing, every paper received three reviews by program committee members. Authors were then given an opportunity to view the first-round reviews and respond to them. Led by a Senior Program Committee member, the reviewers then engaged in a discussion of the paper, leading finally to a decision by the Senior Program Committee member in charge of the paper. Papers could be accepted, rejected, or conditionally accepted; the 36 conditionally accepted papers were subject to an additional final round of review by the Senior Program Committee. Of the 548 submissions, 140 were accepted for publication, an acceptance rate of 25.5%.In addition to the technical talks, ICML-2006 also included seven tutorials and eleven workshops, which were held before and after the conference, respectively. Authors presented their papers both orally and in a poster session, allowing time for detailed discussions with any interested attendees of the conference. Each day of the main conference included an invited talk by a prominent researcher. We were very fortunate to be able to host David Haussler, of the University of California at Santa Cruz; Robert Schapire, of Princeton University; and Mandyam V. Srinivasan, of the Australian National University.

Article
Using inaccurate models in reinforcement learning

In the model-based policy search approach to reinforcement learning (RL), policies are found using a model (or "simulator") of the Markov decision process. However, for high-dimensional continuous-state tasks, it can be extremely difficult to build an ...

Article
Algorithms for portfolio management based on the Newton method

We experimentally study on-line investment algorithms first proposed by Agarwal and Hazan and extended by Hazan et al. which achieve almost the same wealth as the best constant-rebalanced portfolio determined in hindsight. These algorithms are the first ...

Article
Higher order learning with graphs

Recently there has been considerable interest in learning with higher order relations (i.e., three-way or higher) in the unsupervised and semi-supervised settings. Hypergraphs and tensors have been proposed as the natural way of representing these ...

Article
Ranking on graph data

In ranking, one is given examples of order relationships among objects, and the goal is to learn from these examples a real-valued ranking function that induces a ranking or ordering over the object space. We consider the problem of learning such a ...

Article
Robust probabilistic projections

Principal components and canonical correlations are at the root of many exploratory data mining techniques and provide standard pre-processing tools in machine learning. Lately, probabilistic reformulations of these methods have been proposed (Roweis, ...

Article
A DC-programming algorithm for kernel selection

We address the problem of learning a kernel for a given supervised learning task. Our approach consists in searching within the convex hull of a prescribed set of basic kernels for one which minimizes a convex regularization functional. A unique feature ...

Article
Relational temporal difference learning

We introduce relational temporal difference learning as an effective approach to solving multi-agent Markov decision problems with large state spaces. Our algorithm uses temporal difference reinforcement to learn a distributed value function represented ...

Article
A new approach to data driven clustering

We consider the problem of clustering in its most basic form where only a local metric on the data space is given. No parametric statistical model is assumed, and the number of clusters is learned from the data. We introduce, analyze and demonstrate a ...

Article
Agnostic active learning

We state and analyze the first active learning algorithm which works in the presence of arbitrary forms of noise. The algorithm, A2 (for Agnostic Active), relies only upon the assumption that the samples are drawn i.i.d. from a fixed distribution. We ...

Article
On a theory of learning with similarity functions

Kernel functions have become an extremely popular tool in machine learning, with an attractive theory as well. This theory views a kernel as implicitly mapping data points into a possibly very high dimensional space, and describes a kernel function as ...

Article
On Bayesian bounds

We show that several important Bayesian bounds studied in machine learning, both in the batch as well as the online setting, arise by an application of a simple compression lemma. In particular, we derive (i) PAC-Bayesian bounds in the batch setting, (...

Article
Convex optimization techniques for fitting sparse Gaussian graphical models

We consider the problem of fitting a large-scale covariance matrix to multivariate Gaussian data in such a way that the inverse is sparse, thus providing model selection. Beginning with a dense empirical covariance matrix, we solve a maximum likelihood ...

Article
Cover trees for nearest neighbor

We present a tree data structure for fast nearest neighbor operations in general n-point metric spaces (where the data set consists of n points). The data structure requires O(n) space regardless of the metric's structure yet maintains all performance ...

Article
Graph model selection using maximum likelihood

In recent years, there has been a proliferation of theoretical graph models, e.g., preferential attachment and small-world models, motivated by real-world graphs such as the Internet topology. To address the natural question of which model is best for a ...

Article
Dynamic topic models

A family of probabilistic time series models is developed to analyze the time evolution of topics in large document collections. The approach is to use state space models on the natural parameters of the multinomial distributions that represent the ...

Article
Predictive search distributions

Estimation of Distribution Algorithms (EDAs) are a popular approach to learn a probability distribution over the "good" solutions to a combinatorial optimization problem. Here we consider the case where there is a collection of such optimization ...

Article
Learning predictive state representations using non-blind policies

Predictive state representations (PSRs) are powerful models of non-Markovian decision processes that differ from traditional models (e.g., HMMs, POMDPs) by representing state using only observable quantities. Because of this, PSRs can be learned solely ...

Article
Efficient co-regularised least squares regression

In many applications, unlabelled examples are inexpensive and easy to obtain. Semi-supervised approaches try to utilise such examples to reduce the predictive error. In this paper, we investigate a semi-supervised least squares regression algorithm ...

Article
Semi-supervised learning for structured output variables

The problem of learning a mapping between input and structured, interdependent output variables covers sequential, spatial, and relational learning as well as predicting recursive structures. Joint feature representations of the input and output ...

Article
Fast nonparametric clustering with Gaussian blurring mean-shift

We revisit Gaussian blurring mean-shift (GBMS), a procedure that iteratively sharpens a dataset by moving each data point according to the Gaussian mean-shift algorithm (GMS). (1) We give a criterion to stop the procedure as soon as clustering structure ...

Article
An empirical comparison of supervised learning algorithms

A number of supervised learning methods have been introduced in the last decade. Unfortunately, the last comprehensive empirical evaluation of supervised learning was the Statlog Project in the early 90's. We present a large-scale empirical comparison ...

Article
Robust Euclidean embedding

We derive a robust Euclidean embedding procedure based on semidefinite programming that may be used in place of the popular classical multidimensional scaling (cMDS) algorithm. We motivate this algorithm by arguing that cMDS is not particularly robust ...

Article
Hierarchical classification: combining Bayes with SVM

We study hierarchical classification in the general case when an instance could belong to more than one class node in the underlying taxonomy. Experiments done in previous work showed that a simple hierarchy of Support Vectors Machines (SVM) with a top-...

Article
A continuation method for semi-supervised SVMs

Semi-Supervised Support Vector Machines (S3VMs) are an appealing method for using unlabeled data in classification: their objective function favors decision boundaries which do not cut clusters. However their main problem is that the optimization ...

Article
A regularization framework for multiple-instance learning

This paper focuses on kernel methods for multi-instance learning. Existing methods require the prediction of the bag to be identical to the maximum of those of its individual instances. However, this is too restrictive as only the sign is important in ...

Article
Trading convexity for scalability

Convex learning algorithms, such as Support Vector Machines (SVMs), are often seen as highly desirable because they offer strong practical properties and are amenable to theoretical analysis. However, in this work we show how non-convexity can provide ...

Article
Learning algorithms for online principal-agent problems (and selling goods online)

In a principal-agent problem, a principal seeks to motivate an agent to take a certain action beneficial to the principal, while spending as little as possible on the reward. This is complicated by the fact that the principal does not know the agent's ...

Article
Dealing with non-stationary environments using context detection

In this paper we introduce RL-CD, a method for solving reinforcement learning problems in non-stationary environments. The method is based on a mechanism for creating, updating and selecting one among several partial models of the environment. The ...

Article
Locally adaptive classification piloted by uncertainty

Locally adaptive classifiers are usually superior to the use of a single global classifier. However, there are two major problems in designing locally adaptive classifiers. First, how to place the local classifiers, and, second, how to combine them ...

Article
The relationship between Precision-Recall and ROC curves

Receiver Operator Characteristic (ROC) curves are commonly used to present results for binary decision problems in machine learning. However, when dealing with highly skewed datasets, Precision-Recall (PR) curves give a more informative picture of an ...

Cited By

  1. 도 유 (2024). 팬데믹 속 자녀돌봄과 온라인 양육담론의 역동성: 코로나19 3년의 온라인 육아 커뮤니티 분석*, Journal of Family Relations, 10.21321/jfr.28.4.65, 28:4, (65-92), Online publication date: 31-Jan-2024.
  2. Hua S, Rickard M, Weaver J, Xiang A, Alvarez D, Velear K, Sheth K, Tasian G, Lorenzo A, Goldenberg A, Erdman L, Linguraru M, Rittner L, Lepore N, Romero Castro E, Brieva J and Guevara P (2023). From single-visit to multi-visit image-based models: single-visit models are enough to predict obstructive hydronephrosis 18th International Symposium on Medical Information Processing and Analysis (SIPAIM 2022), 10.1117/12.2670148, 9781510662544, (43)
  3. Rathi P, Bhadauria S and Rathi S (2021). Watermarking of Deep Recurrent Neural Network Using Adversarial Examples to Protect Intellectual Property, Applied Artificial Intelligence, 10.1080/08839514.2021.2008613, 36:1, Online publication date: 31-Dec-2022.
  4. Chen L, Lin D, Xu H, Li J and Lin L (2022). WLLP: A weighted reconstruction-based linear label propagation algorithm for predicting potential therapeutic agents for COVID-19, Frontiers in Microbiology, 10.3389/fmicb.2022.1040252, 13
  5. Li R, Lai X and Tiwari R (2022). W2V-ATT: research on text-dependent MDD method based on wav2vec2.0 International Conference on Neural Networks, Information, and Communication Engineering (NNICE 2022), 10.1117/12.2639245, 9781510655171, (50)
  6. Adams D, Merkel C, Zelinski M, Taha T and Howe J (2021). Expanding smart assistant accessibility through dysarthria speech-trained transformer networks Applications of Machine Learning 2021, 10.1117/12.2594212, 9781510645240, (29)
  7. Xia C, Li X, Chen S, Zhao L, Fulop G, Hanson C and Andresen B (2019). Infrared small target detection based on local contrast vector and signed normalization Infrared Technology and Applications XLV, 10.1117/12.2518194, 9781510626690, (76)
  8. Liu J, Ma A, Jing M, Yu H, Pu Y, Li C and Pan Z (2019). Combining discriminant embedding and transfer learning for visual tracking Tenth International Conference on Graphics and Image Processing (ICGIP 2018), 10.1117/12.2524364, 9781510628281, (133)
  9. Bai Y, Pascal Z, Calhoun V, Wang Y, Gimi B and Krol A (2019). Extraction of co-expressed discriminative features of Schizophrenia in imaging epigenetics framework Biomedical Applications in Molecular, Structural, and Functional Imaging, 10.1117/12.2513024, 9781510625532, (31)
  10. Broome B, Hanratty T, Hall D, Llinas J and Pritzkau A (2016). Sense-making for intelligence analysis on social media data SPIE Defense + Security, 10.1117/12.2242537, , (98510J), Online publication date: 12-May-2016.
  11. Ringger E, Lamiroy B, Mioulet L, Bideault G, Chatelain C, Paquet T and Brunessaux S (2015). Exploring multiple feature combination strategies with a recurrent neural network architecture for off-line handwriting recognition IS&T/SPIE Electronic Imaging, 10.1117/12.2075665, , (94020F), Online publication date: 8-Feb-2015.
  12. Yang Z, Tao R, Wang Y and Wang T (2014). A Novel Multi-carrier Order Division Multi-access Communication System Based on TDCS with Fractional Fourier Transform Scheme, Wireless Personal Communications: An International Journal, 79:2, (1301-1320), Online publication date: 1-Nov-2014.
  13. Lo K, Farrell S, Murphy T and Gaensler B (2014). AUTOMATIC CLASSIFICATION OF TIME-VARIABLE X-RAY SOURCES, The Astrophysical Journal, 10.1088/0004-637X/786/1/20, 786:1, (20)
  14. Bazzan A and Klügl F (2013). Introduction to Intelligent Systems in Traffic and Transportation, Synthesis Lectures on Artificial Intelligence and Machine Learning, 10.2200/S00553ED1V01Y201312AIM025, 7:3, (1-137), Online publication date: 20-Dec-2013.
  15. Wang H (2013). A Novel Multiuser SISO-BOFDM Systems with Group Fractional Fourier Transforms Scheme, Wireless Personal Communications: An International Journal, 69:2, (735-743), Online publication date: 1-Mar-2013.
  16. Wang H, Lv W, Bai W and Ma H (2012). A Novel OFDMA Cellular System Based on Multiple FrFT Angles Reuse Scheme, Wireless Personal Communications: An International Journal, 66:4, (707-716), Online publication date: 1-Oct-2012.
  17. Szepesvári C (2010). Algorithms for Reinforcement Learning, Synthesis Lectures on Artificial Intelligence and Machine Learning, 10.2200/S00268ED1V01Y201005AIM009, 4:1, (1-103), Online publication date: 1-Jan-2010.
  18. ACM
    Yeh T, Lee J and Darrell T Photo-based question answering Proceedings of the 16th ACM international conference on Multimedia, (389-398)
Contributors
  • Carnegie Mellon University
  1. Proceedings of the 23rd international conference on Machine learning

    Recommendations

    Acceptance Rates

    ICML '06 Paper Acceptance Rate140of548submissions,26%Overall Acceptance Rate140of548submissions,26%
    YearSubmittedAcceptedRate
    ICML '0654814026%
    Overall54814026%