Sciweavers

3556 search results - page 155 / 712
» Can machine learning be secure
Sort
View
NIPS
2003
14 years 3 days ago
Learning a Distance Metric from Relative Comparisons
This paper presents a method for learning a distance metric from relative comparison such as “A is closer to B than A is to C”. Taking a Support Vector Machine (SVM) approach,...
Matthew Schultz, Thorsten Joachims
CSFW
1998
IEEE
14 years 3 months ago
Honest Ideals on Strand Spaces
In security protocol analysis, it is important to learn general principles that limit the abilities of an attacker, and that can be applied repeatedly to a variety of protocols. W...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
ICMCS
2006
IEEE
371views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Automatic Counting of Interacting People by using a Single Uncalibrated Camera
Automatic counting of people, entering or exiting a region of interest, is very important for both business and security applications. This paper introduces an automatic and robus...
Senem Velipasalar, Ying-li Tian, Arun Hampapur
HT
2005
ACM
14 years 4 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver
KDD
2004
ACM
117views Data Mining» more  KDD 2004»
14 years 11 months ago
Regularized multi--task learning
Past empirical work has shown that learning multiple related tasks from data simultaneously can be advantageous in terms of predictive performance relative to learning these tasks...
Theodoros Evgeniou, Massimiliano Pontil