Sciweavers

570 search results - page 60 / 114
» When does Co-training Work in Real Data
Sort
View
MATA
2004
Springer
149views Communications» more  MATA 2004»
15 years 9 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
146
Voted
EIT
2008
IEEE
15 years 5 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
MLMTA
2007
15 years 5 months ago
Consensus Based Ensembles of Soft Clusterings
— Cluster Ensembles is a framework for combining multiple partitionings obtained from separate clustering runs into a final consensus clustering. This framework has attracted mu...
Kunal Punera, Joydeep Ghosh
JMM2
2008
102views more  JMM2 2008»
15 years 4 months ago
Logical Mapping: An Intermedia Synchronization Model for Multimedia Distributed Systems
The preservation of temporal dependencies among different media data, such as text, still images, video and audio, and which have simultaneous distributed sources as origin, is an ...
Saul Pomares Hernandez, Luis A. Morales Rosales, J...
CORR
2011
Springer
161views Education» more  CORR 2011»
14 years 7 months ago
Doubly Robust Policy Evaluation and Learning
We study decision making in environments where the reward is only partially observed, but can be modeled as a function of an action and an observed context. This setting, known as...
Miroslav Dudík, John Langford, Lihong Li