Sciweavers

3556 search results - page 132 / 712
» Can machine learning be secure
Sort
View
CLUSTER
2006
IEEE
13 years 10 months ago
Distributed File System Virtualization Techniques Supporting On-Demand Virtual Machine Environments for Grid Computing
This paper presents a data management solution which allows fast Virtual Machine (VM) instantiation and efficient run-time execution to support VMs as execution environments in Gri...
Ming Zhao 0002, Jian Zhang 0005, Renato J. O. Figu...
GCC
2009
Springer
13 years 8 months ago
Interfaces for Placement, Migration, and Monitoring of Virtual Machines in Federated Clouds
Current cloud computing infrastructure offerings are lacking in interoperability, which is a hindrance to the advancement and adoption of the cloud computing paradigm. As clouds ar...
Erik Elmroth, Lars Larsson
ICML
2005
IEEE
14 years 11 months ago
Exploration and apprenticeship learning in reinforcement learning
We consider reinforcement learning in systems with unknown dynamics. Algorithms such as E3 (Kearns and Singh, 2002) learn near-optimal policies by using "exploration policies...
Pieter Abbeel, Andrew Y. Ng
HAIS
2009
Springer
14 years 3 months ago
Incremental Kernel Machines for Protein Remote Homology Detection
Abstract. Protein membership prediction is a fundamental task to retrieve information for unknown or unidentified sequences. When support vector machines (SVMs) are associated with...
Lionel Morgado, Carlos Pereira
ASAP
2006
IEEE
114views Hardware» more  ASAP 2006»
14 years 2 months ago
The Mythical CCM: In Search of Usable (and Resuable) FPGA-Based General Computing Machines
Early FPGA researchers understood that FPGAs made possible the creation of a new, flexible, and powerful class of machine -- the configurable computing machine (CCM). The earliest...
Brent E. Nelson