Sciweavers

3502 search results - page 620 / 701
» From Machine Learning to Machine Reasoning
Sort
View
SOUPS
2009
ACM
15 years 10 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner
SYSTOR
2009
ACM
15 years 10 months ago
Transactifying Apache's cache module
Apache is a large-scale industrial multi-process and multithreaded application, which uses lock-based synchronization. We report on our experience in modifying Apache’s cache mo...
Haggai Eran, Ohad Lutzky, Zvika Guz, Idit Keidar
116
Voted
CEC
2008
IEEE
15 years 10 months ago
Evolving GeneChip correlation predictors on parallel graphics hardware
—A GPU is used to datamine five million correlations between probes within Affymetrix HG-U133A probesets across 6685 human tissue samples from NCBI’s GEO database. These conco...
William B. Langdon
ICPR
2008
IEEE
15 years 10 months ago
Grading nuclear pleomorphism on histological micrographs
A mainstay in cancer diagnostics is the classification or grading of cell nuclei based on their appearance. While the analysis of cytological samples has been automated successful...
Eric Cosatto, Matthew Miller, Hans Peter Graf, Joh...
ICPR
2008
IEEE
15 years 10 months ago
On second order operators and quadratic operators
In pattern recognition, computer vision, and image processing, many approaches are based on second order operators. Well-known examples are second order networks, the 3D structure...
Michael Felsberg