Sciweavers

3556 search results - page 269 / 712
» Can machine learning be secure
Sort
View
ML
2002
ACM
163views Machine Learning» more  ML 2002»
15 years 5 months ago
Structural Modelling with Sparse Kernels
A widely acknowledged drawback of many statistical modelling techniques, commonly used in machine learning, is that the resulting model is extremely difficult to interpret. A numb...
Steve R. Gunn, Jaz S. Kandola
CARDIS
1998
Springer
161views Hardware» more  CARDIS 1998»
15 years 9 months ago
Formal Proof of Smart Card Applets Correctness
: The new Gemplus smart card is based on the Java technology, embedding a virtual machine. The security policy uses mechanisms that are based on Java properties. This language prov...
Jean-Louis Lanet, Antoine Requet
FAST
2003
15 years 6 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
ISI
2008
Springer
15 years 5 months ago
A template alignment algorithm for question classification
Question classification (QC) plays a key role in automated question answering (QA) systems. In Chinese QC, for example, a question is analyzed and then labeled with the question ty...
Cheng-Lung Sung, Min-Yuh Day, Hsu-Chun Yen, Wen-Li...
FLAIRS
2004
15 years 6 months ago
Clustering Spatial Data in the Presence of Obstacles
Clustering is a form of unsupervised machine learning. In this paper, we proposed the DBRS_O method to identify clusters in the presence of intersected obstacles. Without doing an...
Xin Wang, Howard J. Hamilton