Sciweavers

1929 search results - page 290 / 386
» An Approach to Limit the Wynot Problem
Sort
View
NDSS
2002
IEEE
14 years 1 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
ICANN
2001
Springer
14 years 1 months ago
Independent Variable Group Analysis
Humans tend to group together related properties in order to understand complex phenomena. When modeling large problems with limited representational resources, it is important to...
Krista Lagus, Esa Alhoniemi, Harri Valpola
ATAL
2007
Springer
14 years 3 months ago
Letting loose a SPIDER on a network of POMDPs: generating quality guaranteed policies
Distributed Partially Observable Markov Decision Problems (Distributed POMDPs) are a popular approach for modeling multi-agent systems acting in uncertain domains. Given the signi...
Pradeep Varakantham, Janusz Marecki, Yuichi Yabu, ...
CVPR
2008
IEEE
14 years 11 months ago
Least squares congealing for unsupervised alignment of images
In this paper, we present an approach we refer to as "least squares congealing" which provides a solution to the problem of aligning an ensemble of images in an unsuperv...
Mark Cox, Sridha Sridharan, Simon Lucey, Jeffrey F...
ECIR
2009
Springer
14 years 6 months ago
"They Are Out There, If You Know Where to Look": Mining Transliterations of OOV Query Terms for Cross-Language Information Retri
It is well known that the use of a good Machine Transliteration system improves the retrieval performance of Cross-Language Information Retrieval (CLIR) systems when the query and ...
Raghavendra Udupa, K. Saravanan, Anton Bakalov, Ab...