Sciweavers

7434 search results - page 32 / 1487
» Still
Sort
View
CAU
2004
192views Cryptology» more  CAU 2004»
15 years 1 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
DAGSTUHL
2004
15 years 1 months ago
Learning with Local Models
Next to prediction accuracy, the interpretability of models is one of the fundamental criteria for machine learning algorithms. While high accuracy learners have intensively been e...
Stefan Rüping
FLAIRS
2004
15 years 1 months ago
In-Depth Analysis of Similarity Knowledge and Metric Contributions to Recommender Performance
Initial successes in the area of recommender systems have led to considerable early optimism. However as a research community, we are still in the early days of our understanding ...
Derry O'Sullivan, Barry Smyth, David C. Wilson
BXML
2003
15 years 1 months ago
Semantic Caching in Ontology-based Mediator Systems
: The integration of heterogenous web sources is still a big challenge. One approach to deal with integration problems is the usage of domain knowledge in form of vocabularies or o...
Marcel Karnstedt, Kai-Uwe Sattler, Ingolf Geist, H...
DAGSTUHL
2003
15 years 1 months ago
Embodied Artificial Intelligence: Trends and Challenges
Abstract. The field of Artificial Intelligence, which started roughly half a century ago, has a turbulent history. In the 1980s there has been a major paradigm shift towards embodi...
Rolf Pfeifer, Fumiya Iida