Sciweavers

4647 search results - page 700 / 930
» Composite Design Patterns
Sort
View
110
Voted
CCS
2009
ACM
15 years 10 months ago
A framework for quantitative security analysis of machine learning
We propose a framework for quantitative security analysis of machine learning methods. Key issus of this framework are a formal specification of the deployed learning model and a...
Pavel Laskov, Marius Kloft
163
Voted
IPPS
2009
IEEE
15 years 10 months ago
Multi-dimensional characterization of temporal data mining on graphics processors
Through the algorthmic design patterns of data parallelism and task parallelism, the graphics processing unit (GPU) offers the potential to vastly accelerate discovery and innovat...
Jeremy S. Archuleta, Yong Cao, Thomas Scogland, Wu...
AIED
2009
Springer
15 years 10 months ago
Who Helps When the Tutor Is Asleep?
While many computer tutoring systems have long been delivered as desktop applications, these systems have only recently begun to appear on mobile devices. In this work we apply pri...
Quincy Brown, Dario D. Salvucci, Frank J. Lee, Vin...
UM
2009
Springer
15 years 9 months ago
Predicting Customer Models Using Behavior-Based Features in Shops
Abstract. Recent sensor technologies have enabled the capture of users’ behavior data. Given the large amount of data currently available from sensor-equipped environments, it is...
Junichiro Mori, Yutaka Matsuo, Hitoshi Koshiba, Ke...
112
Voted
ISLPED
2009
ACM
188views Hardware» more  ISLPED 2009»
15 years 9 months ago
Transaction-based adaptive dynamic voltage scaling for interactive applications
In an interactive embedded system, special task execution patterns and scheduling constraints exist due to frequent human-computer interactions. This paper proposes a transaction-...
Xia Zhao, Yao Guo, Xiangqun Chen