Sciweavers

3556 search results - page 240 / 712
» Can machine learning be secure
Sort
View
OOPSLA
2004
Springer
15 years 10 months ago
Advancements in multicode optimization
In previous work, we have shown that multicodes can be used to improve the performance of Java applications. We extend that work by both implementing more multicodes and consideri...
Ben Stephenson, Wade Holst
ICML
2010
IEEE
15 years 3 months ago
Mining Clustering Dimensions
Many real-world datasets can be clustered along multiple dimensions. For example, text documents can be clustered not only by topic, but also by the author's gender or sentim...
Sajib Dasgupta, Vincent Ng
LAMAS
2005
Springer
15 years 10 months ago
Multi-agent Relational Reinforcement Learning
In this paper we report on using a relational state space in multi-agent reinforcement learning. There is growing evidence in the Reinforcement Learning research community that a r...
Tom Croonenborghs, Karl Tuyls, Jan Ramon, Maurice ...
148
Voted
EUROCRYPT
2000
Springer
15 years 8 months ago
Minimal-Latency Secure Function Evaluation
Sander, Young and Yung recently exhibited a protocol for computing on encrypted inputs, for functions computable in NC1 . In their variant of secure function evaluation, Bob (the &...
Donald Beaver
151
Voted
EGC
2005
Springer
15 years 10 months ago
M-Grid: Using Ubiquitous Web Technologies to Create a Computational Grid
Abstract. There are many potential users and uses for grid computing. However, the concept of sharing computing resources excites security concerns and, whilst being powerful and f...
Robert John Walters, Stephen Crouch