Sciweavers

1020 search results - page 121 / 204
» Learning to Use Operational Advice
Sort
View
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
14 years 11 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
AUSAI
2008
Springer
14 years 1 months ago
Character Recognition Using Hierarchical Vector Quantization and Temporal Pooling
In recent years, there has been a cross-fertilization of ideas between computational neuroscience models of the operation of the neocortex and artificial intelligence models of mac...
John Thornton, Jolon Faichney, Michael Blumenstein...
QRE
2010
129views more  QRE 2010»
13 years 9 months ago
Improving quality of prediction in highly dynamic environments using approximate dynamic programming
In many applications, decision making under uncertainty often involves two steps- prediction of a certain quality parameter or indicator of the system under study and the subseque...
Rajesh Ganesan, Poornima Balakrishna, Lance Sherry
BMCBI
2007
136views more  BMCBI 2007»
13 years 11 months ago
Prediction of tissue-specific cis-regulatory modules using Bayesian networks and regression trees
Background: In vertebrates, a large part of gene transcriptional regulation is operated by cisregulatory modules. These modules are believed to be regulating much of the tissue-sp...
Xiaoyu Chen, Mathieu Blanchette
ACMDIS
2004
ACM
14 years 4 months ago
Tutor design for speech-based interfaces
Speech-based applications commonly come with web-based or printed manuals. Alternatively, the dialogue can be designed so that users should be able to start using the application ...
Jaakko Hakulinen, Markku Turunen, Esa-Pekka Salone...