subject: Computer Science date: 2015
10.4231/R7N58J9Z
Baichuan Zhang, Bartlomiej P. Rajwa, Murat Dundar, Qiang Kou, Yicheng He
10/01/2015
We study a biodetection application as a case study to demonstrate that K-means-based unsupervised feature learning can be a simple yet effective alternative to deep learning techniques for small data sets with limited intra- as well as inter-class diversi...
bacterial colonies BARDOT Biomedical Engineering Computer Science deep learning Elastic light scattering Interdisciplinary Research K-Means Clustering Life Sciences Machine Learning representation learning
10.4231/R7ZG6Q6T
12/30/2015
This dataset includes symbolic variable-precision versions of some of the more important OPQ routines.
Airy weight function Bose-Einstein distribution Chebyshev-type quadratures Classical weight functions Computer Science Fermi Dirac weight Function Freud weight function Gauss-type quadrature rules Hermite weight function Jacobi weight functions K-Bessel weight function Laguerre weight functions Mathematics Matlab OPQ routine Orthogonal polynomials Perl Script quadrature Software source code Walter Gautschi Archives Walter Gautschi Selected Works
10.4231/R7736NV6
07/30/2015
Daedalus is a public cloud risk assessment tool and library. It is intended to allow an analyst to compare the impacts of two or more public cloud providers. Security of the cloud service is modeled by three classes: preconditions, vulnerabilities, and i...
Computer Science Information Security Java Modeling Public cloud providers Risk assessment software Source Code
10.4231/R7SX6B5R
Austin J. Klasa, Courtney Falk
08/19/2015
Daedalus is a public cloud risk assessment tool and library. It is intended to allow an analyst to compare the impacts of two or more public cloud providers. Security of the cloud service is modeled by three classes: preconditions, vulnerabilities, and i...
Computer Science Information Security Java Modeling Public cloud providers Risk assessment software Source Code
10.4231/R7JD4TQM
08/31/2015
This was a survey taken at the HUBbub 2013 meeting about various aspects of users' desire to share their actions as they use online simulation tools. The premise is that by observing the manner in which users parameterize simulation tools will allow a...
10.4231/R7GH9FWM
11/20/2015
This file contains the C++ source code that was used to conduct the experiments from the paper Polynomial Fitting Known Plaintext Attack and produced the experimental data. It finds the equivalent polynomials to the underlying primitives for AES and Serpe...
Computer Science cryptanalysis encryption Information Security known plaintext attack polynomial fitting
10.4231/R72V2D12
Brian Curnett, Melissa J. Dark
06/02/2015
Purpose: This data set can be used to investigate the effect of password policies on real-world passwords created by users under a variety of policies over time. Data set primary file(s): INSURE_Password_strength_analysis_Dataset_Dark.csv Ye...
Computer Science Longitudinal Study Password Analysis Password Policies Passwords Real-World Passwords
Display #
Results 1 - 7 of 7