|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 21
reviews
|
|
|
|
|
|
|
|
Machine learning safety Huang X., Jin G., Ruan W., Springer International Publishing, Singapore, 2023. 321 pp. Type: Book (9789811968136) Machine learning safety delves into the growing field of verification, robustness, training against adversarial attacks, privacy enhancement, and other safety concerns in the context of deep learning (DL) and deep reinforcement learning (DR...
|
Mar 29 2024 |
|
|
|
|
|
|
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges Koay A., Ko R., Hettema H., Radke K. Journal of Intelligent Information Systems 601-29, 2023. Type: Article Today, machine learning (ML) is applied to threat detection and classification problems in the important field of industrial control. This paper reviews different ML papers that apply supervised learning, unsupervised learning, deep learning, and ...
|
Mar 18 2024 |
|
|
|
|
|
|
Distributional reinforcement learning Bellemare M., Dabney W., Rowland M., MIT Press, Cambridge, Massachucetts, 2023. 384 pp. Type: Book (0262048019) Rarely does a book introduce a new field of study at the intersection of computer science, deep reinforcement learning (RL), probability theory, statistics, and applied math. In their work at Google DeepMind, the authors applied technologies like ...
|
Feb 5 2024 |
|
|
|
|
|
|
Reinforcement learning for quantitative trading Sun S., Wang R., An B. ACM Transactions on Intelligent Systems and Technology 12(2): 2023. Type: Article This paper is a good starting point for both learners and practitioners in the fields of algorithmic trading, portfolio management, order execution, market making, and even reinforcement learning (RL), as they launch their deep dives into the inte...
|
Aug 10 2023 |
|
|
|
|
|
|
Deanonymisation of clients in bitcoin P2P network Biryukov A., Khovratovich D., Pustogarov I. CCS 2014 (Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, Nov 3-7, 2014) 15-29, 2014. Type: Proceedings
Detailed descriptions of some parts of the bitcoin code that are not documented well are contained in this paper. Those trying to understand how the bitcoin code works should read this paper to start their journey. However, I am concer...
|
Nov 11 2015 |
|
|
|
|
|
|
Zerocash: decentralized anonymous payments from Bitcoin Ben Sasson E., Chiesa A., Garman C., Green M., Miers I., Tromer E., Virza M. SP 2014 (Proceedings of the 2014 IEEE Symposium on Security and Privacy,May 18-21, 2014) 459-474, 2014. Type: Proceedings
Bitcoin and its underlying blockchain technology have solved the Byzantine generals problem [1]. However, blockchain associated with the Bitcoin currency is a public ledger, and it does not provide the basic privacy offered by financia...
|
Jun 22 2015 |
|
|
|
|
|
|
Selfish routing and the price of anarchy Roughgarden T., The MIT Press, 2005. 240 pp. Type: Book (9780262182430)
Original results from the author’s PhD thesis are presented in this book. It also contains a compilation of results and concepts that could jump-start a newcomer in the field, as well as offer practical tools for network desi...
|
Apr 21 2006 |
|
|
|
|
|
|
Estimating point-to-point and point-to-multipoint traffic matrices: an information-theoretic approach Zhang Y., Roughan M., Lund C., Donoho D. IEEE/ACM Transactions on Networking 13(5): 947-960, 2005. Type: Article
Dimensioning, planning, and expanding a large-scale Internet protocol (IP) network is challenging. The task gets harder without traffic matrices, even though there are simplified network management protocol/management information bases...
|
Apr 5 2006 |
|
|
|
|
|
|
Computing on large-scale distributed systems: XtremWeb architecture, programming models, security, tests and convergence with grid Cappello F., Djilali S., Fedak G., Herault T., Magniette F., Néri V., Lodygensky O. Future Generation Computer Systems 21(3): 417-437, 2005. Type: Article
Grid computing (GC) refers to the middleware used to support resource sharing among large numbers of computers, to increase computing power by sharing tasks. GC is mature enough to have an industry of its own. A simple search on any ma...
|
Dec 13 2005 |
|
|
|
|
|
|
Towards a semantic, deep archival file system Mahalingam M., Tang C., Xu Z. Future trends of distributed computing systems (Proceedings of the Ninth IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS ’03),May 28-30, 2003) 1152003. Type: Proceedings
With the advent of the Internet and search engines, converting data into information and useful knowledge is becoming more and more important. Search engines like Google, Yahoo!, and Microsoft Network (MSN) catalog world data and infor...
|
Sep 24 2004 |
|
|
|
|
|
|
|
|
|
|
|