Sciweavers

4074 search results - page 675 / 815
» Defining Computational Aesthetics
Sort
View
163
Voted
AAMAS
1999
Springer
15 years 3 months ago
Verifying Compliance with Commitment Protocols
Interaction protocols are specific, often standard, constraints on the behaviors of autonomous agents in a multiagent system. Protocols are essential to the functioning of open sys...
Mahadevan Venkatraman, Munindar P. Singh
148
Voted
IJCV
2002
157views more  IJCV 2002»
15 years 3 months ago
Dense Features for Semi-Dense Stereo Correspondence
We present a new feature based algorithm for stereo correspondence. Most of the previous feature based methods match sparse features like edge pixels, producing only sparse dispar...
Olga Veksler
JBI
2002
126views Bioinformatics» more  JBI 2002»
15 years 3 months ago
Characteristic attributes in cancer microarrays
Rapid advances in genome sequencing and gene expression microarray technologies are providing unprecedented opportunities to identify specific genes involved in complex biological...
Indra Neil Sarkar, Paul J. Planet, T. E. Bael, S. ...
JCT
2002
107views more  JCT 2002»
15 years 3 months ago
Asymmetric Binary Covering Codes
An asymmetric binary covering code of length n and radius R is a subset C of the n-cube Qn such that every vector x Qn can be obtained from some vector c C by changing at most R...
Joshua N. Cooper, Robert B. Ellis, Andrew B. Kahng
JMLR
2002
90views more  JMLR 2002»
15 years 3 months ago
Machine Learning with Data Dependent Hypothesis Classes
We extend the VC theory of statistical learning to data dependent spaces of classifiers. This theory can be viewed as a decomposition of classifier design into two components; the...
Adam Cannon, J. Mark Ettinger, Don R. Hush, Clint ...