Sciweavers

589 search results - page 114 / 118
» Modeling affordances using Bayesian networks
Sort
View
ISI
2006
Springer
13 years 9 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
KDD
2009
ACM
191views Data Mining» more  KDD 2009»
14 years 10 months ago
Scalable pseudo-likelihood estimation in hybrid random fields
Learning probabilistic graphical models from high-dimensional datasets is a computationally challenging task. In many interesting applications, the domain dimensionality is such a...
Antonino Freno, Edmondo Trentin, Marco Gori
LOCA
2005
Springer
14 years 3 months ago
Classifying the Mobility of Users and the Popularity of Access Points
Abstract. There is increasing interest in location-aware systems and applications. It is important for any designer of such systems and applications to understand the nature of use...
Minkyong Kim, David Kotz
ICASSP
2009
IEEE
14 years 4 months ago
Multi-channel audio segmentation for continuous observation and archival of large spaces
In most real-world situations, a single microphone is insufficient for the characterization of an entire auditory scene. This often occurs in places such as office environments ...
Gordon Wichern, Harvey D. Thornburg, Andreas Spani...
ICRA
2009
IEEE
132views Robotics» more  ICRA 2009»
14 years 4 months ago
Smoothed Sarsa: Reinforcement learning for robot delivery tasks
— Our goal in this work is to make high level decisions for mobile robots. In particular, given a queue of prioritized object delivery tasks, we wish to find a sequence of actio...
Deepak Ramachandran, Rakesh Gupta