Sciweavers

492 search results - page 83 / 99
» Neuronal Models with Current Inputs
Sort
View
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
14 years 1 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa
COST
2008
Springer
122views Multimedia» more  COST 2008»
13 years 11 months ago
Articulatory Speech Re-synthesis: Profiting from Natural Acoustic Speech Data
The quality of static phones (e.g. vowels, fricatives, nasals, laterals) generated by articulatory speech synthesizers has reached a high level in the last years. Our goal is to ex...
Dominik Bauer, Jim Kannampuzha, Bernd J. Krög...
AAAI
2010
13 years 11 months ago
Towards Multiagent Meta-level Control
Embedded systems consisting of collaborating agents capable of interacting with their environment are becoming ubiquitous. It is crucial for these systems to be able to adapt to t...
Shanjun Cheng, Anita Raja, Victor R. Lesser
IJCAI
2007
13 years 11 months ago
Emotions as Durative Dynamic State for Action Selection
Human intelligence requires decades of full-time training before it can be reliably utilised in modern economies. In contrast, AI agents must be made reliable but interesting in r...
Emmanuel Tanguy, Philip J. Willis, Joanna Bryson
CSREASAM
2006
13 years 11 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam