Sciweavers

5891 search results - page 1082 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
NIPS
2001
15 years 6 months ago
On the Generalization Ability of On-Line Learning Algorithms
In this paper, it is shown how to extract a hypothesis with small risk from the ensemble of hypotheses generated by an arbitrary on-line learning algorithm run on an independent an...
Nicolò Cesa-Bianchi, Alex Conconi, Claudio ...
IJCAI
2003
15 years 6 months ago
On the Design of Social Diagnosis Algorithms for Multi-Agent Teams
Teamwork demands agreement among teammembers to collaborate and coordinate effectively. When a disagreement between teammates occurs (due to failures), team-members should ideally...
Meir Kalech, Gal A. Kaminka
ISCAPDCS
2003
15 years 6 months ago
Optimal Graph Transformation Assuming Alternate Scheduling Models
Many computation-intensive iterative or recursive applications commonly found in digital signal processing and image processing applications can be represented by data-flow graph...
Timothy W. O'Neil
124
Voted
NIPS
2003
15 years 6 months ago
Learning the k in k-means
When clustering a dataset, the right number k of clusters to use is often not obvious, and choosing k automatically is a hard algorithmic problem. In this paper we present an impr...
Greg Hamerly, Charles Elkan
AVSS
2009
IEEE
15 years 5 months ago
Object Tracking from Unstabilized Platforms by Particle Filtering with Embedded Camera Ego Motion
Visual tracking with moving cameras is a challenging task. The global motion induced by the moving camera moves the target object outside the expected search area, according to th...
Carlos R. del-Blanco, Narciso N. García, Lu...
« Prev « First page 1082 / 1179 Last » Next »