Sciweavers

773 search results - page 129 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
ICCBR
2010
Springer
13 years 8 months ago
Applying Machine Translation Evaluation Techniques to Textual CBR
The need for automated text evaluation is common to several AI disciplines. In this work, we explore the use of Machine Translation (MT) evaluation metrics for Textual Case Based R...
Ibrahim Adeyanju, Nirmalie Wiratunga, Robert Lothi...
IJCV
2010
152views more  IJCV 2010»
13 years 8 months ago
Learning Articulated Structure and Motion
Humans demonstrate a remarkable ability to parse complicated motion sequences into their constituent structures and motions. We investigate this problem, attempting to learn the st...
David A. Ross, Daniel Tarlow, Richard S. Zemel
NEW2AN
2010
Springer
13 years 8 months ago
Heuristic Congestion Control for Message Deletion in Delay Tolerant Network
Delay tolerant network (DTN) challenges on large delay of communication, opportunistic and intermittent connectivity so that data can be transferred over vulnerable network. Most r...
Lertluck Leela-amornsin, Hiroshi Esaki
PVLDB
2010
135views more  PVLDB 2010»
13 years 8 months ago
Similarity Search and Mining in Uncertain Databases
Managing, searching and mining uncertain data has achieved much attention in the database community recently due to new sensor technologies and new ways of collecting data. There ...
Matthias Renz, Reynold Cheng, Hans-Peter Kriegel, ...
IFIPTCS
2010
13 years 7 months ago
Deterministic Computations in Time-Varying Graphs: Broadcasting under Unstructured Mobility
Most highly dynamic infrastructure-less networks have in common that the assumption of connectivity does not necessarily hold at a given instant. Still, communication routes can be...
Arnaud Casteigts, Paola Flocchini, Bernard Mans, N...