Sciweavers

8381 search results - page 169 / 1677
» The security of machine learning
Sort
View
132
Voted
ICALT
2006
IEEE
15 years 11 months ago
Learner as a Designer of Digital Learning Tools
This paper will concentrate on how teacher can support learners in creating their own learning tools conducive to learning. Authors will discuss how the journey in creating differ...
Yasmin Bhattacharya, Madhumita Bhattacharya
CIMCA
2005
IEEE
15 years 10 months ago
Opposition-Based Learning: A New Scheme for Machine Intelligence
Opposition-based learning as a new scheme for machine intelligence is introduced. Estimates and counter-estimates, weights and opposite weights, and actions versus counter-actions...
Hamid R. Tizhoosh
ETS
2002
IEEE
132views Hardware» more  ETS 2002»
15 years 4 months ago
Theories for Deep Change in Affect-sensitive Cognitive Machines: A Constructivist Model
There is interplay between emotions and learning, but this interaction is far more complex than previous learning theories have articulated--this interplay interacts with other re...
Barry Kort, Rob Reilly
142
Voted
CCS
2004
ACM
15 years 10 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 11 months ago
Accurate Classification of the Internet Traffic Based on the SVM Method
—The need to quickly and accurately classify Internet traffic for security and QoS control has been increasing significantly with the growing Internet traffic and applications ov...
Zhu Li, Ruixi Yuan, Xiaohong Guan