Sciweavers

1354 search results - page 48 / 271
» Towards Ontology-Guided Design of Learning Information Syste...
Sort
View
115
Voted
CCS
2008
ACM
15 years 4 months ago
Open problems in the security of learning
Machine learning has become a valuable tool for detecting and preventing malicious activity. However, as more applications employ machine learning techniques in adversarial decisi...
Marco Barreno, Peter L. Bartlett, Fuching Jack Chi...
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
15 years 5 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
EICS
2009
ACM
15 years 8 months ago
Toward user interface virtualization: legacy applications and innovative interaction systems
Single-user, desktop-based computer applications are pervasive in our daily lives and work. The prospect of using these applications with innovative interaction systems, like mult...
Guillaume Besacier, Frédéric Vernier
IDEAL
2003
Springer
15 years 7 months ago
Towards a Terabyte Digital Library System
In China-US Million Book Digital Library, output of the digitalization process is more than one terabyte of text in OEB and PDF format. To access these data quickly and accurately,...
Hao Ding, Yun Lin, Bin Liu
147
Voted
MLMI
2004
Springer
15 years 7 months ago
Towards Predicting Optimal Fusion Candidates: A Case Study on Biometric Authentication Tasks
Combining multiple information sources, typically from several data streams is a very promising approach, both in experiments and to some extend in various real-life applications. ...
Norman Poh, Samy Bengio