Sciweavers

889 search results - page 153 / 178
» Observational Learning in Random Networks
Sort
View
CCS
2003
ACM
14 years 1 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
FOCS
1989
IEEE
13 years 12 months ago
Constant Depth Circuits, Fourier Transform, and Learnability
In this paper, Boolean functions in ,4C0 are studied using harmonic analysis on the cube. The main result is that an ACO Boolean function has almost all of its “power spectrum”...
Nathan Linial, Yishay Mansour, Noam Nisan
AAAI
2011
12 years 7 months ago
Logistic Methods for Resource Selection Functions and Presence-Only Species Distribution Models
In order to better protect and conserve biodiversity, ecologists use machine learning and statistics to understand how species respond to their environment and to predict how they...
Steven Phillips, Jane Elith
NN
2006
Springer
232views Neural Networks» more  NN 2006»
13 years 7 months ago
A probabilistic model of gaze imitation and shared attention
An important component of language acquisition and cognitive learning is gaze imitation. Infants as young as one year of age can follow the gaze of an adult to determine the objec...
Matthew W. Hoffman, David B. Grimes, Aaron P. Shon...
ICIP
2003
IEEE
14 years 9 months ago
Integrated end-to-end buffer management and congestion control for scalable video communications
In this paper we present a video communication system that integrates end-to-end buffer management and congestion control at the source with the playout adjustment mechanism at th...
Ivan V. Bajic, Omesh Tickoo, Anand Balan, Shivkuma...