Sciweavers

658 search results - page 43 / 132
» Open problems in the security of learning
Sort
View
ICML
2007
IEEE
14 years 9 months ago
More efficiency in multiple kernel learning
An efficient and general multiple kernel learning (MKL) algorithm has been recently proposed by Sonnenburg et al. (2006). This approach has opened new perspectives since it makes ...
Alain Rakotomamonjy, Francis Bach, Stéphane...
GECCO
2010
Springer
212views Optimization» more  GECCO 2010»
14 years 1 months ago
Generative and developmental systems
This paper argues that multiagent learning is a potential “killer application” for generative and developmental systems (GDS) because key challenges in learning to coordinate ...
Kenneth O. Stanley
CRYPTO
2004
Springer
79views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
Abstract. In this paper, we study the existence of multicollisions in iterated hash functions. We show that finding multicollisions, i.e. r-tuples of messages that all hash to the...
Antoine Joux
TCS
2008
13 years 8 months ago
A simple transitive signature scheme for directed trees
Transitive signatures allow a signer to authenticate edges in a graph in such a way that anyone, given the public key and two signatures on adjacent edges (i, j) and (j, k), can c...
Gregory Neven
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
14 years 3 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classi...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...