Sciweavers

3556 search results - page 47 / 712
» Can machine learning be secure
Sort
View
ACSAC
2003
IEEE
14 years 2 months ago
A Failure to Learn from the Past
On the evening of 2 November 1988, someone “infected” the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versi...
Eugene H. Spafford
CORR
2008
Springer
193views Education» more  CORR 2008»
13 years 9 months ago
Faster and better: a machine learning approach to corner detection
The repeatability and efficiency of a corner detector determines how likely it is to be useful in a real-world application. The repeatability is importand because the same scene vi...
Edward Rosten, Reid Porter, Tom Drummond
BMCBI
2011
13 years 4 months ago
DoBo: Protein domain boundary prediction by integrating evolutionary signals and machine learning
Background: Accurate identification of protein domain boundaries is useful for protein structure determination and prediction. However, predicting protein domain boundaries from a...
Jesse Eickholt, Xin Deng, Jianlin Cheng
NPC
2007
Springer
14 years 3 months ago
A Cost-Aware Parallel Workload Allocation Approach Based on Machine Learning Techniques
Parallelism is one of the main sources for performance improvement in modern computing environment, but the efficient exploitation of the available parallelism depends on a number ...
Shun Long, Grigori Fursin, Björn Franke
ICDM
2008
IEEE
120views Data Mining» more  ICDM 2008»
14 years 3 months ago
Prediction of Skin Penetration Using Machine Learning Methods
Improving predictions of the skin permeability coefficient is a difficult problem. It is also an important issue with the increasing use of skin patches as a means of drug deliv...
Yi Sun, Gary P. Moss, Maria Prapopoulou, Rod Adams...