Sciweavers

5109 search results - page 10 / 1022
» On Learning Limiting Programs
Sort
View
COMPSEC
2006
141views more  COMPSEC 2006»
13 years 9 months ago
Comparing Java and .NET security: Lessons learned and missed
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
ECML
2006
Springer
14 years 1 months ago
An Efficient Approximation to Lookahead in Relational Learners
Abstract. Greedy machine learning algorithms suffer from shortsightedness, potentially returning suboptimal models due to limited exploration of the search space. Greedy search mis...
Jan Struyf, Jesse Davis, C. David Page Jr.
CIE
2007
Springer
14 years 4 months ago
Input-Dependence in Function-Learning
In the standard model of inductive inference, a learner gets as input the graph of a function, and has to discover (in the limit) a program for the function. In this paper, we cons...
Sanjay Jain, Eric Martin, Frank Stephan
ICASSP
2007
IEEE
14 years 4 months ago
Breaking the Limitation of Manifold Analysis for Super-Resolution of Facial Images
A novel method for robust super-resolution offace images is proposed in this paper. Face super-resolution is a particular interest in video surveillance where face images have typ...
Sung Won Park, Marios Savvides
JCP
2007
145views more  JCP 2007»
13 years 9 months ago
AnnAnn and AnnAnn.Net: Tools for Teaching Programming
— It is difficult for a student to learn about programs and to understand the rational that went into the development of the parts that led to the whole. Tools for explaining thi...
Clare J. Hooper, Les Carr, Hugh C. Davis, David E....