Sciweavers

950 search results - page 155 / 190
» Modified global k
Sort
View
DIM
2005
ACM
13 years 12 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
ECIR
2010
Springer
13 years 11 months ago
A Framework for Evaluating Automatic Image Annotation Algorithms
Several Automatic Image Annotation (AIA) algorithms have been introduced recently, which have been found to outperform previous models. However, each one of them has been evaluated...
Konstantinos Athanasakos, Vassilios Stathopoulos, ...
AIPS
2006
13 years 11 months ago
On Some Tractable Cases of Logical Filtering
Filtering denotes any method whereby an agent updates its belief state--its knowledge of the state of the world--from a sequence of actions and observations. In logical filtering,...
T. K. Satish Kumar, Stuart J. Russell
IADIS
2003
13 years 11 months ago
The Dynamics of Trade Patterns in the Internet Era
The effects of the privatization and commercialization of Internet on world trade are often debated but few rigorous conclusions emerge. Such conclusions have not been based on in...
Vijay K. Vemuri, Shahid Siddiqi
NIPS
2003
13 years 11 months ago
Extreme Components Analysis
Principal components analysis (PCA) is one of the most widely used techniques in machine learning and data mining. Minor components analysis (MCA) is less well known, but can also...
Max Welling, Felix V. Agakov, Christopher K. I. Wi...