Sciweavers

3556 search results - page 228 / 712
» Can machine learning be secure
Sort
View
164
Voted
CASSIS
2004
Springer
15 years 10 months ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann
136
Voted
AGENTS
2000
Springer
15 years 9 months ago
BoB: an interactive improvisational music companion
This paper introduces a new domain for believable agents (BA) and presents novel methods for dealing with the unique challenges that arise therein. The domain is providing improvi...
Belinda Thom
DIMEA
2008
137views Multimedia» more  DIMEA 2008»
15 years 6 months ago
Biometric tendency recognition and classification system: an artistic approach
The Biometric Tendency Recognition and Classification System is a software application that continuously measures a participant's physiological responses to a given image and...
Carlos Castellanos, Philippe Pasquier, Luther Thie...
ESORICS
2011
Springer
14 years 4 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
ECTEL
2007
Springer
15 years 11 months ago
Lifecycle Information Management for Learning Resources and Knowledge Documents
Lifecycle information can be of great help in the retrieval, authoring and usage of both, Learning Resources and Knowledge Documents. In my PhD thesis I want to show how the differ...
Lasse Lehmann