Sciweavers

1138 search results - page 60 / 228
» Talking about concerns
Sort
View
ACSAC
2008
IEEE
15 years 1 months ago
Preventing Information Leaks through Shadow Executions
A concern about personal information confidentiality typically arises when any desktop application communicates to the external network, for example, to its producer's server...
Roberto Capizzi, Antonio Longo, V. N. Venkatakrish...
LREC
2008
101views Education» more  LREC 2008»
15 years 1 months ago
The INFILE Project: a Crosslingual Filtering Systems Evaluation Campaign
The InFile project (INformation, FILtering, Evaluation) is a cross-language adaptive filtering evaluation campaign, sponsored by the French National Research Agency. The campaign ...
Romaric Besançon, Stéphane Chaudiron...
AAAI
2006
15 years 1 months ago
Value-Function-Based Transfer for Reinforcement Learning Using Structure Mapping
Transfer learning concerns applying knowledge learned in one task (the source) to improve learning another related task (the target). In this paper, we use structure mapping, a ps...
Yaxin Liu, Peter Stone
CSREASAM
2006
15 years 1 months ago
Securing Collaborative Applications
Mobile technologies are experiencing rapid growth and adoption in both enterprise and consumer markets, as users demand unfettered access to resources, services, and data at any ti...
Manoj B. Sastry, Michael J. Covington, Deepak J. M...
MANSCI
2006
94views more  MANSCI 2006»
14 years 11 months ago
Design of Robust Business-to-Business Electronic Marketplaces with Guaranteed Privacy
Most successful online marketplaces today are owned and operated by firms that are themselves traders in the marketplace. This raises significant concerns about the fairness of th...
Joakim Kalvenes, Amit Basu