Sciweavers

528 search results - page 59 / 106
» What Can We Learn Privately
Sort
View
ICRA
2007
IEEE
155views Robotics» more  ICRA 2007»
14 years 4 months ago
Dogged Learning for Robots
— Ubiquitous robots need the ability to adapt their behaviour to the changing situations and demands they will encounter during their lifetimes. In particular, non-technical user...
Daniel H. Grollman, Odest Chadwicke Jenkins
AAAI
2007
14 years 1 hour ago
Comprehending and Generating Apt Metaphors: A Web-driven, Case-based Approach to Figurative Language
Examples of figurative language can range from the explicit and the obvious to the implicit and downright enigmatic. Some simpler forms, like simile, often wear their meanings on...
Tony Veale, Yanfen Hao
WPES
2003
ACM
14 years 2 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
PERCOM
2011
ACM
13 years 1 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
SAFECOMP
2001
Springer
14 years 2 months ago
Designing Safety into Medical Decisions and Clinical Processes
After many years of experimental research software systems to support clinical decisionmaking are now moving into routine clinical practice. Most of the research to date has been ...
John Fox