Sciweavers

658 search results - page 15 / 132
» Open problems in the security of learning
Sort
View
COLT
2007
Springer
14 years 1 months ago
U-Shaped, Iterative, and Iterative-with-Counter Learning
This paper solves an important problem left open in the literature by showing that U-shapes are unnecessary in iterative learning. A U-shape occurs when a learner first learns, t...
John Case, Samuel E. Moelius
VISUALIZATION
2005
IEEE
14 years 1 months ago
Opening the Black Box - Data Driven Visualization of Neural Network
Arti cial neural networks are computer software or hardware models inspired by the structure and behavior of neurons in the human nervous system. As a powerful learning tool, incr...
Fan-Yin Tzeng, Kwan-Liu Ma
PKC
2010
Springer
118views Cryptology» more  PKC 2010»
13 years 9 months ago
Text Search Protocols with Simulation Based Security
This paper presents an efficient protocol for securely computing the fundamental problem of pattern matching. This problem is defined in the two-party setting, where party P1 hold...
Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
ROBOCUP
2009
Springer
134views Robotics» more  ROBOCUP 2009»
14 years 2 months ago
Learning Complementary Multiagent Behaviors: A Case Study
As the reach of multiagent reinforcement learning extends to more and more complex tasks, it is likely that the diverse challenges posed by some of these tasks can only be address...
Shivaram Kalyanakrishnan, Peter Stone
WMASH
2005
ACM
14 years 1 months ago
WilmaGate: a new open access gateway for hotspot management
Wireless access has already become a ubiquitous way to connect to the Internet, but the mushrooming of wireless access infrastructures throughout the world has given rise to a wid...
Mauro Brunato, Danilo Severina