Sciweavers

658 search results - page 84 / 132
» Open problems in the security of learning
Sort
View
ISCI
2010
146views more  ISCI 2010»
13 years 5 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
ISI
2005
Springer
14 years 1 months ago
Private Mining of Association Rules
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among two parti...
Justin Z. Zhan, Stan Matwin, LiWu Chang
DSMML
2004
Springer
14 years 1 months ago
Multi Channel Sequence Processing
Abstract. This paper summarizes some of the current research challenges arising from multi-channel sequence processing. Indeed, multiple real life applications involve simultaneous...
Samy Bengio, Hervé Bourlard
FGR
2004
IEEE
161views Biometrics» more  FGR 2004»
13 years 11 months ago
AdaBoost with Totally Corrective Updates for Fast Face Detection
An extension of the AdaBoost learning algorithm is proposed and brought to bear on the face detection problem. In each weak classifier selection cycle, the novel totally correctiv...
Jan Sochman, Jiri Matas
ISSA
2004
13 years 9 months ago
A Unified Architecture For Automatic Software Updates
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
Dominic White