Sciweavers

102 search results - page 13 / 21
» Exploiting WordNet as Background Knowledge
Sort
View
SIGMOD
2009
ACM
185views Database» more  SIGMOD 2009»
14 years 7 months ago
Attacks on privacy and deFinetti's theorem
In this paper we present a method for reasoning about privacy using the concepts of exchangeability and deFinetti's theorem. We illustrate the usefulness of this technique by...
Daniel Kifer
MMM
2009
Springer
180views Multimedia» more  MMM 2009»
14 years 4 months ago
Personalized News Video Recommendation
In this paper, a novel framework is developed to support personalized news video recommendation. First, multi-modal information sources for news videos are seamlessly integrated an...
Hangzai Luo, Jianping Fan, Daniel A. Keim, Shin'ic...
FASE
2007
Springer
14 years 1 months ago
Contract-Driven Development
Although unit tests are recognized as an important tool in software development, programmers prefer to write code, rather than unit tests. Despite the emergence of tools like JUni...
Bertrand Meyer
ILP
2007
Springer
14 years 1 months ago
Building Relational World Models for Reinforcement Learning
Abstract. Many reinforcement learning domains are highly relational. While traditional temporal-difference methods can be applied to these domains, they are limited in their capaci...
Trevor Walker, Lisa Torrey, Jude W. Shavlik, Richa...
IBPRIA
2005
Springer
14 years 1 months ago
Robust Person-Independent Visual Sign Language Recognition
Sign language recognition constitutes a challenging field of research in computer vision. Common problems like overlap, ambiguities, and minimal pairs occur frequently and require...
Jörg Zieren, Karl-Friedrich Kraiss