J–Machine

Results: 754



#Item
71Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
72Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
73Carnegie Mellon University / Supervised learning / Machine learning / John D. Lafferty

J OHN D. L AFFERTY — B IOGRAPHICAL S KETCH Address Department of Statistics & Department of Computer Science University of Chicago Chicago, IL 60637

Add to Reading List

Source URL: galton.uchicago.edu

Language: English - Date: 2016-04-13 06:56:27
74Dimension reduction / Artificial neural networks / Self-organizing map / Data mining / Concept learning / Machine learning / Cluster analysis / Graph database

Higher Order Cognition using Computers: Learning Abstract Concepts with Recursive Graph-based Self Organizing Maps Peter J. Bentley1, 2, Alexander Kurashov1 and Soo Ling Lim1, 2 1 Braintree Limited, London, United Kingd

Add to Reading List

Source URL: s3-eu-west-1.amazonaws.com

Language: English - Date: 2016-04-28 11:15:27
75

Submodular Functions, Optimization, and Applications to Machine Learning — Spring Quarter, Lecture 12 — http://j.ee.washington.edu/~bilmes/classes/ee596b_spring_2014/ Prof. Je↵ Bilmes

Add to Reading List

Source URL: j.ee.washington.edu

Language: English - Date: 2014-05-28 14:35:43
    76

    Statistics, Data Mining and Machine Learning in Astronomy: A Practical Python Guide for the Analysis of Survey Data ˇ ´, Andrew J. Connolly, Jacob T. VanderPlas Zeljko

    Add to Reading List

    Source URL: www.astroml.org

    Language: English - Date: 2014-01-27 13:51:41
      77Wireless networking / Routing algorithms / Computing / Network management / Routing protocols / Network architecture / Routing / Expected transmission count / Wireless ad hoc network / Optimized Link State Routing Protocol / Link-state routing protocol / Wireless sensor network

      MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Distributed Sleep Management for Heterogeneous Wireless Machine-to-Machine Networks Paraskevas, E.; Guo, J.; Orlik, P.V.; Sawa, K.

      Add to Reading List

      Source URL: www.merl.com

      Language: English - Date: 2016-04-13 07:30:14
      78

      In Proceedings of the 25th International Conference on Machine Learning (ICML),. Helsinki, Finland, JulyLearning to Sportscast: A Test of Grounded Language Acquisition David L. Chen Raymond J. Mooney

      Add to Reading List

      Source URL: www.cs.utexas.edu

      Language: English - Date: 2008-07-21 16:16:30
        79Computational linguistics / Natural language processing / Automatic Content Extraction / Support vector machine / Relation / Semantics / Data mining

        Relation Extraction on the J.D. Power and Associates Sentiment Corpus by Gregory Ichneumon Brown B.S., Cornell University, 2000

        Add to Reading List

        Source URL: greg.ichneumon.net

        Language: English - Date: 2015-01-21 23:31:22
        80

        Journal of Machine Learning Research1388 Submitted 4/10; Revised 1/11; Published 4/11 Faster Algorithms for Max-Product Message-Passing∗ Julian J. McAuley†

        Add to Reading List

        Source URL: tiberiocaetano.com

        Language: English - Date: 2011-05-03 19:53:12
          UPDATE