Sciweavers

3556 search results - page 165 / 712
» Can machine learning be secure
Sort
View
AIED
2009
Springer
14 years 5 months ago
Intelligent Support for Inquiry Learning from Images: A Learning Scenario and Tool
Inquiry learning involves the learner acquiring new concepts and skills by means of carrying out an investigation. Some previous studies have looked into how these learning activit...
Paul Mulholland, Zdenek Zdráhal, Jan Abraha...
ICMLA
2008
14 years 6 days ago
Ensemble Machine Methods for DNA Binding
We introduce three ensemble machine learning methods for analysis of biological DNA binding by transcription factors (TFs). The goal is to identify both TF target genes and their ...
Yue Fan, Mark A. Kon, Charles DeLisi
ACSAC
2005
IEEE
14 years 4 months ago
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high a...
Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ra...
IEEEARES
2008
IEEE
14 years 5 months ago
haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism
A secure logging mechanism named haplog is proposed. In essence, haplog uses only one-way hash functions to achieve the security and functional requirements of logging. This makes...
Chih-Yin Lin
BIBM
2008
IEEE
137views Bioinformatics» more  BIBM 2008»
14 years 5 months ago
Exploring Alternative Splicing Features Using Support Vector Machines
Alternative splicing is a mechanism for generating different gene transcripts (called isoforms) from the same genomic sequence. Finding alternative splicing events experimentally ...
Jing Xia, Doina Caragea, Susan Brown