Sciweavers

658 search results - page 68 / 132
» Open problems in the security of learning
Sort
View
AAAI
2006
13 years 10 months ago
Subjective Mapping
Extracting a map from a stream of experience is a key problem in robotics and artificial intelligence in general. We propose a technique, called subjective mapping, that seeks to ...
Michael H. Bowling, Dana F. Wilkinson, Ali Ghodsi
KDD
2007
ACM
132views Data Mining» more  KDD 2007»
14 years 9 months ago
A scalable modular convex solver for regularized risk minimization
A wide variety of machine learning problems can be described as minimizing a regularized risk functional, with different algorithms using different notions of risk and different r...
Choon Hui Teo, Alex J. Smola, S. V. N. Vishwanatha...
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis
ECTEL
2007
Springer
14 years 3 months ago
Model Driven E-Learning Platform Integration
The success of the e-learning paradigm observed in recent times created a growing demand for e-learning systems in universities and other educational institutions, that itself led ...
Zuzana Bizonova
EUROCRYPT
2006
Springer
14 years 21 days ago
Perfect Non-interactive Zero Knowledge for NP
Non-interactive zero-knowledge (NIZK) proof systems are fundamental cryptographic primitives used in many constructions, including CCA2-secure cryptosystems, digital signatures, an...
Jens Groth, Rafail Ostrovsky, Amit Sahai