Sciweavers

4004 search results - page 69 / 801
» How Many Packets Can We Encode
Sort
View
KCAP
2003
ACM
15 years 7 months ago
Using transformations to improve semantic matching
Many AI tasks require determining whether two knowledge representations encode the same knowledge. Solving this matching problem is hard because representations may encode the sam...
Peter Z. Yeh, Bruce W. Porter, Ken Barker
125
Voted
JANCL
2002
66views more  JANCL 2002»
15 years 2 months ago
Reasoning Credulously and skeptically within a single extension
Consistency-based approaches in nonmonotonic reasoning may be expected to yield multiple sets of default conclusions for a given default theory. Reasoning about such extensions is ...
James P. Delgrande, Torsten Schaub
CTRSA
2007
Springer
146views Cryptology» more  CTRSA 2007»
15 years 8 months ago
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most s...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
CVPR
2004
IEEE
16 years 4 months ago
How Features of the Human Face Affect Recognition: A Statistical Comparison of Three Face Recognition Algorithms
Recognition difficulty is statistically linked to ??? subject covariate factors such as age and gender for three face recognition algorithms: principle components analysis, an int...
Geof H. Givens, J. Ross Beveridge, Bruce A. Draper...
106
Voted
AAAI
2008
15 years 4 months ago
How Good is Almost Perfect?
Heuristic search using algorithms such as A and IDA is the prevalent method for obtaining optimal sequential solutions for classical planning tasks. Theoretical analyses of these ...
Malte Helmert, Gabriele Röger