Sciweavers

3556 search results - page 20 / 712
» Can machine learning be secure
Sort
View
HPCC
2007
Springer
14 years 1 months ago
File and Memory Security Analysis for Grid Systems
The grid security architecture today does not prevent certain unauthorized access to the files associated with a job executing on a remote machine. Programs and data are transferre...
Unnati Thakore, Lorie M. Liebrock
MAS
1998
Springer
152views Communications» more  MAS 1998»
13 years 12 months ago
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Abstract. Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we di...
Robert S. Gray, David Kotz, George Cybenko, Daniel...
ICALT
2006
IEEE
14 years 1 months ago
Adaptive e-Learning Methods and IMS Learning Design: An Integrated Approach
This position paper shows how several classical methods in adaptive learning can be addressed using IMS Learning Design. After a definition of four main questions to classify adap...
Daniel Burgos, Marcus Specht
ICML
2004
IEEE
14 years 8 months ago
The Bayesian backfitting relevance vector machine
Traditional non-parametric statistical learning techniques are often computationally attractive, but lack the same generalization and model selection abilities as state-of-the-art...
Aaron D'Souza, Sethu Vijayakumar, Stefan Schaal
SIGIR
2010
ACM
13 years 11 months ago
Uncovering social spammers: social honeypots + machine learning
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community value and related services like search and advert...
Kyumin Lee, James Caverlee, Steve Webb