Sciweavers

2914 search results - page 532 / 583
» Learning and Inference with Constraints
Sort
View
ICML
2006
IEEE
14 years 10 months ago
Totally corrective boosting algorithms that maximize the margin
We consider boosting algorithms that maintain a distribution over a set of examples. At each iteration a weak hypothesis is received and the distribution is updated. We motivate t...
Gunnar Rätsch, Jun Liao, Manfred K. Warmuth
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
MM
2006
ACM
218views Multimedia» more  MM 2006»
14 years 3 months ago
SmartLabel: an object labeling tool using iterated harmonic energy minimization
Labeling objects in images is an essential prerequisite for many visual learning and recognition applications that depend on training data, such as image retrieval, object detecti...
Wen Wu, Jie Yang
AGENTS
2000
Springer
14 years 2 months ago
Automated assistants to aid humans in understanding team behaviors
Multi-agent teamwork is critical in a large number of agent applications, including training, education, virtual enterprises and collective robotics. Tools that can help humans an...
Taylor Raines, Milind Tambe, Stacy Marsella
ICVGIP
2008
13 years 11 months ago
How Much Zoom is the Right Zoom from the Perspective of Super-Resolution?
Constructing a high-resolution (HR) image from lowresolution (LR) image(s) has been a very active research topic recently with focus shifting from multi-frames to learning based s...
Himanshu Arora, Anoop M. Namboodiri