Sciweavers

3556 search results - page 244 / 712
» Can machine learning be secure
Sort
View
158
Voted
DAC
2010
ACM
15 years 8 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
MLDM
2005
Springer
15 years 10 months ago
Low-Level Cursive Word Representation Based on Geometric Decomposition
Abstract. An efficient low-level word image representation plays a crucial role in general cursive word recognition. This paper proposes a novel representation scheme, where a word...
Jian-xiong Dong, Adam Krzyzak, Ching Y. Suen, Domi...
131
Voted
ICMLA
2010
15 years 3 months ago
An All-at-once Unimodal SVM Approach for Ordinal Classification
Abstract--Support vector machines (SVMs) were initially proposed to solve problems with two classes. Despite the myriad of schemes for multiclassification with SVMs proposed since ...
Joaquim F. Pinto da Costa, Ricardo Sousa, Jaime S....
ICML
2009
IEEE
16 years 5 months ago
Ranking interesting subgroups
Subgroup discovery is the task of identifying the top k patterns in a database with most significant deviation in the distribution of a target attribute Y . Subgroup discovery is ...
Stefan Rueping
SIGCSE
2006
ACM
134views Education» more  SIGCSE 2006»
15 years 11 months ago
jFAST: a java finite automata simulator
Visualization and interactivity are valuable active learning techniques that can improve mastery of difficult concepts. In this paper we describe jFAST, an easy-to-use graphical s...
Timothy M. White, Thomas P. Way