Sciweavers

199 search results - page 33 / 40
» Intensional Positive Set Theory
Sort
View
FOIKS
2008
Springer
13 years 9 months ago
Aggregation of Attack Relations: A Social-Choice Theoretical Analysis of Defeasibility Criteria
Abstract. This paper analyzes the aggregation of different abstract attack relations over a common set of arguments. Each of those attack relations can be considered as the represe...
Fernando A. Tohmé, Gustavo Adrian Bodanza, ...
VMV
2001
161views Visualization» more  VMV 2001»
13 years 9 months ago
Viewpoint Selection using Viewpoint Entropy
Computation of good viewpoints is important in several fields: computational geometry, visual servoing, robot motion, graph drawing, etc. In addition, selection of good views is r...
Pere-Pau Vázquez, Miquel Feixas, Mateu Sber...
FFA
2006
79views more  FFA 2006»
13 years 7 months ago
Lattice-based threshold-changeability for standard CRT secret-sharing schemes
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the deal...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
CSDA
2007
101views more  CSDA 2007»
13 years 7 months ago
The evaluation of evidence for exponentially distributed data
At present, likelihood ratios for two-level models are determined with the use of a normal kernel estimation procedure when the between-group distribution is thought to be non-nor...
C. G. G. Aitken, Qiang Shen, Richard Jensen, B. Ha...
JMLR
2006
103views more  JMLR 2006»
13 years 7 months ago
Pattern Recognition for Conditionally Independent Data
In this work we consider the task of relaxing the i.i.d. assumption in pattern recognition (or classification), aiming to make existing learning algorithms applicable to a wider r...
Daniil Ryabko