Sciweavers

2229 search results - page 102 / 446
» On Reporting Fold Differences
Sort
View
HICSS
2011
IEEE
183views Biometrics» more  HICSS 2011»
12 years 12 months ago
Optimizing Access across Multiple Hierarchies in Data Warehouses
In enterprise data warehouses, different users in different business units often define their own application specific dimension hierarchies tailor made to their reporting and b...
Lipyeow Lim, Bishwaranjan Bhattacharjee
EMNLP
2008
13 years 9 months ago
A comparison of Bayesian estimators for unsupervised Hidden Markov Model POS taggers
There is growing interest in applying Bayesian techniques to NLP problems. There are a number of different estimators for Bayesian models, and it is useful to know what kinds of t...
Jianfeng Gao, Mark Johnson
CSL
2010
Springer
13 years 9 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
COGSCI
2010
80views more  COGSCI 2010»
13 years 8 months ago
The Interactive Evolution of Human Communication Systems
This paper compares two explanations of the process by which human communication systems evolve: iterated learning and social collaboration. It then reports an experiment testing ...
Nicolas Fay, Simon Garrod, Leo Roberts, Nik Swobod...
ICIP
2003
IEEE
14 years 9 months ago
Using polarimetric imaging for material classification
In this paper we are mainly interested in the classification of images into different clusters, each corresponding to an object material in the imaged scene. For that purpose, the...
Jihad Zallat, Pierre Grabbling, Yoshitate Takakura