Sciweavers

3556 search results - page 618 / 712
» Can machine learning be secure
Sort
View
BIBM
2007
IEEE
104views Bioinformatics» more  BIBM 2007»
14 years 2 months ago
A Protocol to Detect Local Affinities Involved in Proteins Distant Interactions
The tridimensional structure of a protein is constrained or stabilized by some local interactions between distant residues of the protein, such as disulfide bonds, electrostatic i...
Christophe Nicolas Magnan, Cécile Capponi, ...
FLAIRS
2010
14 years 19 days ago
Handling of Numeric Ranges for Graph-Based Knowledge Discovery
Nowadays, graph-based knowledge discovery algorithms do not consider numeric attributes (they are discarded in the preprocessing step, or they are treated as alphanumeric values w...
Oscar E. Romero, Jesus A. Gonzalez, Lawrence B. Ho...
CN
2000
98views more  CN 2000»
13 years 10 months ago
Dynamic pricing by software agents
We envision a future in which the global economy and the Internet will merge and evolve together into an information economy bustling with billions of economically motivated softw...
Jeffrey O. Kephart, James E. Hanson, Amy R. Greenw...
CCS
2003
ACM
14 years 3 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
CCS
2001
ACM
14 years 1 months ago
Efficient State Updates for Key Management
Encryption is widely used to enforce usage rules for digital content. In many scenarios content is encrypted using a group key which is known to a group of users that are allowed ...
Benny Pinkas