Sciweavers

8381 search results - page 155 / 1677
» The security of machine learning
Sort
View
161
Voted
SIGOPS
2011
210views Hardware» more  SIGOPS 2011»
14 years 12 months ago
Small trusted primitives for dependable systems
Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault toleran...
Petros Maniatis, Byung-Gon Chun
CCS
2008
ACM
15 years 6 months ago
VEP: a virtual machine for extended proof-carrying code
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating the proofs which are inherently larg...
Heidar Pirzadeh, Danny Dubé
ICML
2006
IEEE
16 years 5 months ago
Reinforcement learning for optimized trade execution
We present the first large-scale empirical application of reinforcement learning to the important problem of optimized trade execution in modern financial markets. Our experiments...
Yuriy Nevmyvaka, Yi Feng, Michael S. Kearns
ECML
2006
Springer
15 years 8 months ago
Right of Inference: Nearest Rectangle Learning Revisited
In Nearest Rectangle (NR) learning, training instances are generalized into hyperrectangles and a query is classified according to the class of its nearest rectangle. The method ha...
Byron J. Gao, Martin Ester
COLT
2008
Springer
15 years 6 months ago
Learning Mixtures of Product Distributions Using Correlations and Independence
We study the problem of learning mixtures of distributions, a natural formalization of clustering. A mixture of distributions is a collection of distributions D = {D1, . . . DT },...
Kamalika Chaudhuri, Satish Rao