Sciweavers

619 search results - page 24 / 124
» Learning with Security
Sort
View
AGENTS
1997
Springer
13 years 11 months ago
Learning View Graphs for Robot Navigation
Abstract. We present a purely vision-based scheme for learning a topological representation of an open environment. The system represents selected places by local views of the surr...
Matthias O. Franz, Bernhard Schölkopf, Philip...
TCC
2012
Springer
245views Cryptology» more  TCC 2012»
12 years 3 months ago
Secure Two-Party Computation with Low Communication
We propose a 2-party UC-secure protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the ...
Ivan Damgård, Sebastian Faust, Carmit Hazay
HAIS
2009
Springer
14 years 8 days ago
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
ESSOS
2009
Springer
14 years 2 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
TLT
2010
90views more  TLT 2010»
13 years 6 months ago
To Flow and Not to Freeze: Applying Flow Experience to Mobile Learning
— A key design goal of mobile learning is that its built-in experiences are enjoyable and proactive, empowering the learner with the knowledge and ability to self-manage. This im...
Jungho Park, David Parsons, Hokyoung Ryu