Sciweavers

824 search results - page 128 / 165
» Learning probabilistic logic models from probabilistic examp...
Sort
View
145
Voted
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 9 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
152
Voted
IJCV
2008
223views more  IJCV 2008»
15 years 3 months ago
Robust Object Detection with Interleaved Categorization and Segmentation
This paper presents a novel method for detecting and localizing objects of a visual category in cluttered real-world scenes. Our approach considers object categorization and figure...
Bastian Leibe, Ales Leonardis, Bernt Schiele
149
Voted
APIN
2008
305views more  APIN 2008»
15 years 3 months ago
A generalized model for financial time series representation and prediction
Abstract Traditional financial analysis systems utilize lowlevel price data as their analytical basis. For example, a decision-making system for stock predictions regards raw price...
Depei Bao
120
Voted
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 3 months ago
Bayesian Optimisation Algorithm for Nurse Scheduling
: Our research has shown that schedules can be built mimicking a human scheduler by using a set of rules that involve domain knowledge. This chapter presents a Bayesian Optimizatio...
Jingpeng Li, Uwe Aickelin
139
Voted
AIME
2007
Springer
15 years 7 months ago
Using Temporal Context-Specific Independence Information in the Exploratory Analysis of Disease Processes
Abstract. Disease processes in patients are temporal in nature and involve uncertainty. It is necessary to gain insight into these processes when aiming at improving the diagnosis,...
Stefan Visscher, Peter J. F. Lucas, Ildikó ...