Sciweavers

3556 search results - page 580 / 712
» Can machine learning be secure
Sort
View
UML
2005
Springer
14 years 4 months ago
Specifying Precise Use Cases with Use Case Charts
Use cases are a popular method for capturing and structuring software requirements. The informality of use cases is both a blessing and a curse. It enables easy application and lea...
Jon Whittle
HPCN
1998
Springer
14 years 2 months ago
PARAFLOW: A Dataflow Distributed Data-Computing System
We describe the Paraflow system for connecting heterogeneous computing services together into a flexible and efficient data-mining metacomputer. There are three levels of parallel...
Roy Williams, Bruce Sears
AUSAI
2008
Springer
14 years 17 days ago
Character Recognition Using Hierarchical Vector Quantization and Temporal Pooling
In recent years, there has been a cross-fertilization of ideas between computational neuroscience models of the operation of the neocortex and artificial intelligence models of mac...
John Thornton, Jolon Faichney, Michael Blumenstein...
PRL
2008
198views more  PRL 2008»
13 years 10 months ago
Pose estimation and tracking using multivariate regression
This paper presents an extension of the relevance vector machine (RVM) algorithm to multivariate regression. This allows the application to the task of estimating the pose of an a...
Arasanathan Thayananthan, Ramanan Navaratnam, Bj&o...
ASIACRYPT
2000
Springer
14 years 2 months ago
Towards Signature-Only Signature Schemes
We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infr...
Adam Young, Moti Yung