Sciweavers

1522 search results - page 108 / 305
» Practical Exception Specifications
Sort
View
STOC
1999
ACM
106views Algorithms» more  STOC 1999»
15 years 6 months ago
Scheduling in the Dark
We considered non-clairvoyant multiprocessor scheduling of jobs with arbitrary arrival times and changing execution characteristics. The problem has been studied extensively when ...
Jeff Edmonds
IDMS
1998
Springer
107views Multimedia» more  IDMS 1998»
15 years 6 months ago
Classifying Objectionable Websites Based on Image Content
This paper describes IBCOW Image-based Classi cation of Objectionable Websites, a system capable of classifying a website as objectionable or benign based on image content. The sys...
James Ze Wang, Jia Li, Gio Wiederhold, Oscar Firsc...
ITS
1998
Springer
107views Multimedia» more  ITS 1998»
15 years 6 months ago
Toward a Unification of Human-Computer Learning and Tutoring
We define a learning tutor as being an intelligent agent that learns from human tutors and then tutors human learners. The notion of a learning tutor provides a conceptual framewor...
Henry Hamburger, Gheorghe Tecuci
STOC
1993
ACM
117views Algorithms» more  STOC 1993»
15 years 5 months ago
Efficient noise-tolerant learning from statistical queries
In this paper, we study the problem of learning in the presence of classification noise in the probabilistic learning model of Valiant and its variants. In order to identify the cl...
Michael J. Kearns
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
15 years 5 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...