Sciweavers

186 search results - page 35 / 38
» Learning about Constraints by Reflection
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Sensing-aware classification with high-dimensional data
In many applications decisions must be made about the state of an object based on indirect noisy observation of highdimensional data. An example is the determination of the presen...
Burkay Orten, Prakash Ishwar, W. Clem Karl, Venkat...
GRAPHICSINTERFACE
2011
12 years 11 months ago
Formation sketching: an approach to stylize groups in crowd simulation
Most of existing crowd simulation algorithms focus on the moving trajectories of individual agents, while collective group formations are often roughly learned from video examples...
Qin Gu, Zhigang Deng
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
KDD
2005
ACM
218views Data Mining» more  KDD 2005»
14 years 8 months ago
A maximum entropy web recommendation system: combining collaborative and content features
Web users display their preferences implicitly by navigating through a sequence of pages or by providing numeric ratings to some items. Web usage mining techniques are used to ext...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
TASE
2008
IEEE
13 years 7 months ago
Modeling and Supervisory Control of Railway Networks Using Petri Nets
In this paper we deal with the problem of modeling railway networks with Petri nets so as to apply the theory of supervisory control for discrete event systems to automatically de...
Alessandro Giua, Carla Seatzu