Sciweavers

2588 search results - page 353 / 518
» Applications of Kolmogorov complexity to computable model th...
Sort
View
CHI
2010
ACM
15 years 8 months ago
Using reinforcement to strengthen users' secure behaviors
Users have a strong tendency toward dismissing security dialogs unthinkingly. Prior research has shown that users' responses to security dialogs become significantly more tho...
Ricardo Villamarín-Salomón, Jos&eacu...
CCS
2006
ACM
15 years 5 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
PR
2002
88views more  PR 2002»
15 years 1 months ago
Indexing chromatic and achromatic patterns for content-based colour image retrieval
In this paper, we present a method to represent achromatic and chromatic image signals independently for content-based image indexing and retrieval for image database applications...
Guoping Qiu
HPCC
2009
Springer
15 years 6 months ago
On the Performance of Commit-Time-Locking Based Software Transactional Memory
Compared with lock-based synchronization techniques, Software Transactional Memory (STM) can significantly improve the programmability of multithreaded applications. Existing res...
Zhengyu He, Bo Hong
BRAIN
2010
Springer
15 years 3 months ago
Cognitive Informatics and Denotational Mathematical Means for Brain Informatics
Cognitive informatics studies the natural intelligence and the brain from a theoretical and a computational approach, which rigorously explains the ms of the brain by a fundamental...
Yingxu Wang