Sciweavers

8381 search results - page 168 / 1677
» The security of machine learning
Sort
View

Book
498views
17 years 3 months ago
Machine Learning, Neural and Statistical Classification
This book covers several topics such as Classification, Classical Statistical Methods, Modern Statistical Techniques, Machine Learning of Rules and Trees, Neural Networks Methods ...
Ellis Horwood
SOUPS
2009
ACM
15 years 11 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner
ICML
2009
IEEE
16 years 5 months ago
Multi-assignment clustering for Boolean data
Conventional clustering methods typically assume that each data item belongs to a single cluster. This assumption does not hold in general. In order to overcome this limitation, w...
Andreas P. Streich, Mario Frank, David A. Basin, J...
123
Voted
ML
2006
ACM
15 years 11 months ago
ML grid programming with ConCert
Grid computing has become increasingly popular with the growth of the Internet, especially in large-scale scientific computation. Computational Grids are characterized by their s...
Tom Murphy VII
133
Voted
ICALT
2007
IEEE
15 years 11 months ago
A Conceptual Structure for Organizational Learning and Organizational Performance
This paper constructs a conceptual structure for organizational learning and organizational performance based on the core competitive capability view. Based on the research of org...
Li Zhang, Qiong Jia, Ping Li