Sciweavers

3556 search results - page 153 / 712
» Can machine learning be secure
Sort
View
ICALT
2007
IEEE
14 years 5 months ago
Integrating Dynamic Program Visualization into BlueJ: the Jeliot 3 Extension
Previous research on program visualization tools has suggested that both static and dynamic aspects of the program shall be shown to novice students. We attempted to expand the st...
Niko Myller, Roman Bednarik, Andrés Moreno
ICALT
2006
IEEE
14 years 4 months ago
The Generation of E-Learning Exercise Problems from Subject Ontologies
The teaching/ learning of cognitive skills, such as problem-solving, is an important goal in most forms of education. In well-structured subject areas certain exercise problem typ...
Edmond Holohan, Mark Melia, Declan McMullen, Claus...
SOSP
2007
ACM
14 years 7 months ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...
CRYPTO
1999
Springer
159views Cryptology» more  CRYPTO 1999»
14 years 3 months ago
UMAC: Fast and Secure Message Authentication
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current prac...
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovet...
ICML
2009
IEEE
14 years 11 months ago
Learning structural SVMs with latent variables
We present a large-margin formulation and algorithm for structured output prediction that allows the use of latent variables. Our proposal covers a large range of application prob...
Chun-Nam John Yu, Thorsten Joachims