Sciweavers

1690 search results - page 15 / 338
» Algorithmic Properties of Millstream Systems
Sort
View
ECCV
2004
Springer
14 years 24 days ago
Capacity and Examples of Template-Protecting Biometric Authentication Systems
Abstract. In this paper, we formulate the requirements for privacy protecting biometric authentication systems. The secrecy capacity Cs is investigated for the discrete and the con...
Pim Tuyls, Jasper Goseling
SNPD
2003
13 years 8 months ago
Application of Behavior-Preserving Transformations to Improve Non-Functional Properties of an Architecture Specification
In particular for safety critical systems it is necessary to make sure that the non-functional properties imposed by a system architecture meet the corresponding requirements as e...
Lars Grunske
FSS
2002
106views more  FSS 2002»
13 years 7 months ago
Comments on "A fuzzy backpropagation algorithm"
We comment on the learning properties of the fuzzy backpropagation algorithm introduced in Stoeva and Nikov (Fuzzy Sets and Systems 112 (2000) 27). c 2001 Elsevier Science B.V. Al...
Gareth Jones, Philippe De Wilde
BMCBI
2008
145views more  BMCBI 2008»
13 years 7 months ago
The contrasting properties of conservation and correlated phylogeny in protein functional residue prediction
Background: Amino acids responsible for structure, core function or specificity may be inferred from multiple protein sequence alignments where a limited set of residue types are ...
Jonathan R. Manning, Emily R. Jefferson, Geoffrey ...
ICML
1995
IEEE
14 years 8 months ago
Residual Algorithms: Reinforcement Learning with Function Approximation
A number of reinforcement learning algorithms have been developed that are guaranteed to converge to the optimal solution when used with lookup tables. It is shown, however, that ...
Leemon C. Baird III