Sciweavers

3303 search results - page 637 / 661
» Multidimensional Access Methods
Sort
View
CSREASAM
2003
13 years 11 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
NIPS
2001
13 years 11 months ago
Spike timing and the coding of naturalistic sounds in a central auditory area of songbirds
In nature, animals encounter high dimensional sensory stimuli that have complex statistical and dynamical structure. Attempts to study the neural coding of these natural signals f...
B. D. Wright, Kamal Sen, William Bialek, A. J. Dou...
WSCG
2004
151views more  WSCG 2004»
13 years 11 months ago
Inserting G1 Discontinuities into Free-form Features for Aesthetic Design
Free form shapes are often used to fulfil both aesthetic and design constraints applied to parametric models currently adopted in CAD environments. Up to now, designers and engine...
Vincent Cheutet, Jean-Philippe Pernot, Jean-Claude...
NDQA
2003
156views Education» more  NDQA 2003»
13 years 11 months ago
Toward a Question Answering Roadmap
Growth in government investment, academic research, and commercial question answering (QA) systems is motivating a need for increased planning and coordination. The internationali...
Mark T. Maybury
NDQA
2003
119views Education» more  NDQA 2003»
13 years 11 months ago
Inference Web: Portable and Sharable Explanations for Question Answering
The World Wide Web lacks support for explaining information provenance. When web applications return results, many users do not know what information sources were used, when they ...
Deborah L. McGuinness, Paulo Pinheiro da Silva