Sciweavers

1376 search results - page 134 / 276
» The Localization Hypothesis and Machines
Sort
View
92
Voted
CSREASAM
2007
15 years 2 months ago
Software Protection by Hardware and Obfuscation
In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote serv...
Bin Fu, Sai Aravalli, John Abraham
SEFM
2009
IEEE
15 years 7 months ago
Specifying Interacting Components with Coordinated Concurrent Scenarios
Abstract. We introduce a visual notation for local specification of concurrent components based on message sequence charts (MSCs). Each component is a finite-state machine whose ...
Prakash Chandrasekaran, Madhavan Mukund
94
Voted
ISSRE
2003
IEEE
15 years 6 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
104
Voted
ICML
2009
IEEE
16 years 1 months ago
Geometry-aware metric learning
In this paper, we introduce a generic framework for semi-supervised kernel learning. Given pairwise (dis-)similarity constraints, we learn a kernel matrix over the data that respe...
Zhengdong Lu, Prateek Jain, Inderjit S. Dhillon
ML
2010
ACM
193views Machine Learning» more  ML 2010»
14 years 7 months ago
On the eigenvectors of p-Laplacian
Spectral analysis approaches have been actively studied in machine learning and data mining areas, due to their generality, efficiency, and rich theoretical foundations. As a natur...
Dijun Luo, Heng Huang, Chris H. Q. Ding, Feiping N...