Sciweavers

3155 search results - page 209 / 631
» How Are You Doing
Sort
View
IACR
2011
97views more  IACR 2011»
12 years 9 months ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen
ICDCIT
2012
Springer
12 years 4 months ago
Decision Making as Optimization in Multi-robot Teams
Abstract. A key challenge in multi-robot teaming research is determining how to properly enable robots to make decisions on actions they should take to contribute to the overall sy...
Lynne E. Parker
INFOCOM
2012
IEEE
11 years 11 months ago
Estimators also need shared values to grow together
—Network management applications require large numbers of counters in order to collect traffic characteristics for each network flow. However, these counters often barely fit ...
Erez Tsidon, Iddo Hanniel, Isaac Keslassy
CVPR
2009
IEEE
1084views Computer Vision» more  CVPR 2009»
15 years 4 months ago
Describing Objects by their Attributes
We propose to shift the goal of recognition from naming to describing. Doing so allows us not only to name familiar objects, but also: to report unusual aspects of a familiar ob...
Ali Farhadi, David A. Forsyth, Derek Hoiem, Ian En...
ICML
2005
IEEE
14 years 10 months ago
Supervised versus multiple instance learning: an empirical comparison
We empirically study the relationship between supervised and multiple instance (MI) learning. Algorithms to learn various concepts have been adapted to the MI representation. Howe...
Soumya Ray, Mark Craven