Sciweavers

8381 search results - page 162 / 1677
» The security of machine learning
Sort
View
150
Voted
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
15 years 11 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
128
Voted
USENIX
2008
15 years 7 months ago
Diverse Replication for Single-Machine Byzantine-Fault Tolerance
New single-machine environments are emerging from abundant computation available through multiple cores and secure virtualization. In this paper, we describe the research challeng...
Byung-Gon Chun, Petros Maniatis, Scott Shenker
ICALT
2006
IEEE
15 years 11 months ago
Adaptive e-Learning Methods and IMS Learning Design: An Integrated Approach
This position paper shows how several classical methods in adaptive learning can be addressed using IMS Learning Design. After a definition of four main questions to classify adap...
Daniel Burgos, Marcus Specht
CHI
2010
ACM
15 years 11 months ago
Examining multiple potential models in end-user interactive concept learning
End-user interactive concept learning is a technique for interacting with large unstructured datasets, requiring insights from both human-computer interaction and machine learning...
Saleema Amershi, James Fogarty, Ashish Kapoor, Des...
ICALT
2006
IEEE
15 years 11 months ago
Future Visions of Technology-Enhanced Professional Learning
The paper presents future visions of technologyenhanced professional learning as expressed in a panEuropean roadmapping activity. The paper introduces a new approach to developing...
Vana Kamtsiou, Ambjörn Naeve, Lampros K. Ster...