Sciweavers

857 search results - page 55 / 172
» Maximum Entropy Utility
Sort
View
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
14 years 1 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
EMMCVPR
1997
Springer
14 years 27 days ago
Genetic Algorithms for Ambiguous Labelling Problems
Consistent labelling problems frequently have more than one solution. Most work in the "eld has aimed at disambiguating early in the interpretation process, using only local ...
Richard Myers, Edwin R. Hancock
AAAI
2010
13 years 5 months ago
Multilinear Maximum Distance Embedding Via L1-Norm Optimization
Dimensionality reduction plays an important role in many machine learning and pattern recognition tasks. In this paper, we present a novel dimensionality reduction algorithm calle...
Yang Liu, Yan Liu, Keith C. C. Chan
ICRA
2009
IEEE
145views Robotics» more  ICRA 2009»
14 years 3 months ago
Distributed maximum a posteriori estimation for multi-robot cooperative localization
— This paper presents a distributed Maximum A Posteriori (MAP) estimator for multi-robot Cooperative Localization (CL). As opposed to centralized MAP-based CL, the proposed algor...
Esha D. Nerurkar, Stergios I. Roumeliotis, Agostin...
ICPR
2008
IEEE
14 years 3 months ago
Fuzzy maximum scatter discriminant analysis and its application to face recognition
In this paper, a reformative scatter difference discriminant criterion (SDDC) with fuzzy set theory is studied. The scatter difference between between-class and within-class as di...
Jianguo Wang, Wankou Yang, Jingyu Yang