Sciweavers

126 search results - page 24 / 26
» How well does active learning
Sort
View
IEICET
2006
79views more  IEICET 2006»
13 years 7 months ago
System LSI: Challenges and Opportunities
End of CMOS scaling has been discussed in many places since the late 90's. Even if the end of CMOS scaling is irrelevant, it is for sure that we are facing a turning point in...
Tadahiro Kuroda
MP
2010
119views more  MP 2010»
13 years 5 months ago
Efficient and fair routing for mesh networks
Inspired by the One Laptop Per Child project, we consider mesh networks that connect devices that cannot recharge their batteries easily. We study how the mesh should retransmit in...
Andrea Lodi, Enrico Malaguti, Nicolás E. St...
ICMLA
2010
13 years 5 months ago
Semi-Supervised Anomaly Detection for EEG Waveforms Using Deep Belief Nets
Abstract--Clinical electroencephalography (EEG) is routinely used to monitor brain function in critically ill patients, and specific EEG waveforms are recognized by clinicians as s...
Drausin Wulsin, Justin Blanco, Ram Mani, Brian Lit...
CIVR
2007
Springer
210views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Semantic video analysis for psychological research on violence in computer games
In this paper, we present an automatic semantic video analysis system to support interdisciplinary research efforts in the field of psychology and media science. The psychological...
Markus Mühling, Ralph Ewerth, Thilo Stadelman...
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 7 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya