Sciweavers

2025 search results - page 206 / 405
» On the Utility of Inference Mechanisms
Sort
View
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
14 years 2 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon
GW
2007
Springer
93views Biometrics» more  GW 2007»
14 years 2 months ago
Sequential Belief-Based Fusion of Manual and Non-manual Information for Recognizing Isolated Signs
Abstract. This work aims to recognize signs which have both manual and nonmanual components by providing a sequential belief-based fusion mechanism. We propose a methodology based ...
Oya Aran, Thomas Burger, Alice Caplier, Lale Akaru...
HOLOMAS
2007
Springer
14 years 2 months ago
Auctions with Arbitrary Deals
To come to a deal, a bargaining process can sometimes take a long time. An auction may be a faster, but existing auction models cannot cope with situations where money is not an is...
Tamás Máhr, Mathijs de Weerdt
ICCBR
2007
Springer
14 years 2 months ago
An Analysis of Case-Based Value Function Approximation by Approximating State Transition Graphs
We identify two fundamental points of utilizing CBR for an adaptive agent that tries to learn on the basis of trial and error without a model of its environment. The first link co...
Thomas Gabel, Martin Riedmiller
GLOBECOM
2006
IEEE
14 years 2 months ago
End-to-end Congestion Management for Real-Time Streaming Video over the Internet
– In this paper, we propose a new transport protocol, namely Scalable Streaming Video Protocol (SSVP), which employs an AIMD-oriented congestion control mechanism. SSVP, in a com...
Panagiotis Papadimitriou, Vassilis Tsaoussidis