Sciweavers

134 search results - page 12 / 27
» Experimental analysis of privacy loss in DCOP algorithms
Sort
View
ACSAC
2007
IEEE
15 years 1 months ago
Efficiency Issues of Rete-Based Expert Systems for Misuse Detection
This paper provides a general and comprehensive approach to implementing misuse detection on expert systems and an in-depth analysis of the effectiveness of the optimization strat...
Michael Meier, Ulrich Flegel, Sebastian Schmerl
67
Voted
CODES
2008
IEEE
14 years 11 months ago
Slack analysis in the system design loop
We present a system-level technique to analyze the impact of design optimizations on system-level timing dependencies. This technique enables us to speed up the design cycle by su...
Girish Venkataramani, Seth Copen Goldstein
CCS
2009
ACM
15 years 4 months ago
A framework for quantitative security analysis of machine learning
We propose a framework for quantitative security analysis of machine learning methods. Key issus of this framework are a formal specification of the deployed learning model and a...
Pavel Laskov, Marius Kloft
CIKM
2009
Springer
15 years 4 months ago
A general magnitude-preserving boosting algorithm for search ranking
Traditional boosting algorithms for the ranking problems usually employ the pairwise approach and convert the document rating preference into a binary-value label, like RankBoost....
Chenguang Zhu, Weizhu Chen, Zeyuan Allen Zhu, Gang...
ACSAC
2007
IEEE
15 years 3 months ago
Routing in the Dark: Pitch Black
In many networks, such as mobile ad-hoc networks and friend-to-friend overlay networks, direct communication between nodes is limited to specific neighbors. Often these networks ...
Nathan S. Evans, Chris GauthierDickey, Christian G...