Sciweavers

1843 search results - page 67 / 369
» Securing Class Initialization
Sort
View
MICAI
2010
Springer
15 years 27 days ago
Combining Neural Networks Based on Dempster-Shafer Theory for Classifying Data with Imperfect Labels
This paper addresses the supervised learning in which the class membership of training data are subject to uncertainty. This problem is tackled in the framework of the Dempster-Sha...
Mahdi Tabassian, Reza Ghaderi, Reza Ebrahimpour
226
Voted
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 9 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
ACSAC
2001
IEEE
15 years 6 months ago
Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care
Shared Care is the common answer to the challenge for improving health system's quality and efficiency. This development must be accompanied by implementing shared care infor...
Bernd Blobel
126
Voted
CCS
2008
ACM
15 years 4 months ago
Computational soundness of observational equivalence
Many security properties are naturally expressed as indistinguishability between two versions of a protocol. In this paper, we show that computational proofs of indistinguishabili...
Hubert Comon-Lundh, Véronique Cortier
CRYPTO
2012
Springer
262views Cryptology» more  CRYPTO 2012»
13 years 5 months ago
Functional Encryption with Bounded Collusions via Multi-party Computation
We construct a functional encryption scheme secure against an a-priori bounded polynomial number of collusions for the class of all polynomial-size circuits. Our constructions req...
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee