Sciweavers

3556 search results - page 676 / 712
» Can machine learning be secure
Sort
View
RAID
2009
Springer
14 years 2 months ago
VirusMeter: Preventing Your Cellphone from Spies
Due to the rapid advancement of mobile communication technology, mobile devices nowadays can support a variety of data services that are not traditionally available. With the growi...
Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen
HASKELL
2006
ACM
14 years 1 months ago
Statically typed linear algebra in Haskell
Many numerical algorithms are specified in terms of operations on vectors and matrices. Matrix operations can be executed extremely efficiently using specialized linear algebra k...
Frederik Eaton
PODS
1999
ACM
151views Database» more  PODS 1999»
14 years 1 days ago
Exact and Approximate Aggregation in Constraint Query
We investigate the problem of how to extend constraint query languages with aggregate operators. We deal with standard relational aggregation, and also with aggregates speci c to ...
Michael Benedikt, Leonid Libkin
GBRPR
2007
Springer
13 years 11 months ago
An Efficient Ontology-Based Expert Peering System
Abstract. This paper proposes an expert peering system for information exchange. Our objective is to develop a real-time search engine for an online community where users can ask e...
Tansu Alpcan, Christian Bauckhage, Sachin Agarwal
WSC
1997
13 years 9 months ago
Making Better Manufacturing Decisions with AIM
FACTOR/AIM (AIM) is a simulation system designed specifically for use in manufacturing decision support. AIM has been successfully applied to engineering design, scheduling, and p...
Julie N. Ehrlich, William R. Lilegdon