Sciweavers

2263 search results - page 39 / 453
» The Use of Functional and Logic Languages in Machine Learnin...
Sort
View
CONEXT
2007
ACM
15 years 3 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek
CVPR
2006
IEEE
16 years 3 months ago
Meta-Evaluation of Image Segmentation Using Machine Learning
Image segmentation is a fundamental step in many computer vision applications. Generally, the choice of a segmentation algorithm, or parameterization of a given algorithm, is sele...
Hui Zhang, Sharath R. Cholleti, Sally A. Goldman, ...
TBILLC
2005
Springer
15 years 6 months ago
Natural Logic for Natural Language
We implement the extension of the logical consequence relation to a partial order ≤ on arbitary types built from e (entities) and t (Booleans) that was given in [1], and the deï...
Jan van Eijck
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
14 years 1 months ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...
CICLING
2005
Springer
15 years 6 months ago
A Machine Learning Approach to Information Extraction
Information extraction is concerned with applying natural language processing to automatically extract the essential details from text documents. A great disadvantage of current ap...
Alberto Téllez-Valero, Manuel Montes-y-G&oa...