نتایج جستجو برای: auditable machine learning
تعداد نتایج: 739407 فیلتر نتایج به سال:
We introduce the underlying concepts which give rise to some of commonly used machine learning methods, excluding deep-learning machines and neural networks. point their advantages, limitations potential use in various areas photonics. The main methods covered include parametric non-parametric regression classification techniques, kernel-based support vector machines, decision trees, probabilis...
Ayurveda medicines uses herbs for curing many ailments without side effects. The biggest concern related to medicine is extinction of important medicinal herbs, which may be due insufficient knowledge, weather conditions, and urbanization. Another reason consists lack online facts on Indian because it dependent books experts. This has motivated in utilizing the machine learning techniques ident...
Prediction-based decisions, which are often made by utilizing the tools of machine learning, influence nearly all facets modern life. Ethical concerns about this widespread practice have given rise to field fair learning and a number fairness measures, mathematically precise definitions that purport determine whether prediction-based decision system is fair. Following Reuben Binns (2017), we ta...
The Journal of Smart Environments and Green Computing is an international, peer-reviewed, open access journal which provides a forum for the publication papers addressing variety theoretical, methodological, epistemological, empirical practical issues. following topics are especially welcome: green computing, sustainable energy efficiency, decision making, cloud smart cities, renewable energy, ...
In the last few years the efficiency of secure multi-party computation (MPC) increased in several orders of magnitudes. However, this alone might not be enough if we want MPC protocols to be used in practice. A crucial property that is needed in many applications is that everyone can check that a given (secure) computation was performed correctly – even in the extreme case where all the parties...
“What could be easier than counting a bunch of votes!” is a natural thought when one first thinks of the problem of electronic voting. It does not seem very hard either to build an Internet-based system which enables people to vote conveniently from their PCs, WAP phones, or other personal devices. The problem gets much more difficult, however, if one wants to address ballot secrecy in a seriou...
We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers. This is achieved by letting observers (which need not be trusted) verify the absence of covert channels by means of techniques we introduce herein. Our tamper-evident mix network is a type of re-encryption mixnet in which a se...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید