Index

A

Abuse
approaches
abuser out of loop
add costs
less interesting for abusers
machine learning, adversary
business
boosting content
computers, compromising
direct theft
driving traffic
personal information, compromising
scales
SeeScales, abuse
suppressing content
telemetry
ways affecting intelligent system
Anti-malware system
APIs
Automated experiences

B

Balance intelligent experiences
cost of mistakes
factors
forcefulness
frequency
intelligence quality
value of success
Betting-based-interaction
Big problems

C

Changes in intelligence
Checklist, intelligent system project
approach
creation
implementation
orchestration
planning
Conceptual machine learning
algorithm
process
Confidence interval
Content processing
Contexts
forms
intelligence creation
runtime intelligence
Cost of implementation ...

Get Building Intelligent Systems: A Guide to Machine Learning Engineering now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.