Sciweavers

3556 search results - page 632 / 712
» Can machine learning be secure
Sort
View
IISWC
2008
IEEE
14 years 4 months ago
PARSEC vs. SPLASH-2: A quantitative comparison of two multithreaded benchmark suites on Chip-Multiprocessors
The PARSEC benchmark suite was recently released and has been adopted by a significant number of users within a short amount of time. This new collection of workloads is not yet ...
Christian Bienia, Sanjeev Kumar, Kai Li
IRI
2008
IEEE
14 years 4 months ago
Robust integration of multiple information sources by view completion
There are many applications where multiple data sources, each with its own features, are integrated in order to perform an inference task in an optimal way. Researchers have shown...
Shankara B. Subramanya, Baoxin Li, Huan Liu
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 4 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ICCV
2007
IEEE
14 years 4 months ago
Contextual Distance for Data Perception
Structural perception of data plays a fundamental role in pattern analysis and machine learning. In this paper, we develop a new structural perception of data based on local conte...
Deli Zhao, Zhouchen Lin, Xiaoou Tang
IV
2007
IEEE
144views Visualization» more  IV 2007»
14 years 4 months ago
Evaluating an InfoVis Technique Using Insight Reports
The evaluation of Information Visualization (InfoVis) techniques can help to identify specific strengths and weaknesses of these methods. The following article describes the resu...
Markus Rester, Margit Pohl, Sylvia Wiltner, Klaus ...