Sciweavers

1005 search results - page 140 / 201
» Practical Secure Function Evaluation
Sort
View
IDA
2005
Springer
14 years 3 months ago
Learning from Ambiguously Labeled Examples
Inducing a classification function from a set of examples in the form of labeled instances is a standard problem in supervised machine learning. In this paper, we are concerned w...
Eyke Hüllermeier, Jürgen Beringer
ECML
2006
Springer
14 years 2 months ago
EM Algorithm for Symmetric Causal Independence Models
Causal independence modelling is a well-known method both for reducing the size of probability tables and for explaining the underlying mechanisms in Bayesian networks. In this pap...
Rasa Jurgelenaite, Tom Heskes
CDES
2008
90views Hardware» more  CDES 2008»
13 years 12 months ago
Nanocompilation for the Cell Matrix Architecture
- The Cell Matrix Architecture is a massive array of dynamically self-configurable, uniformly connected, identical computational units. This architecture can enable efficient, prac...
Thomas Way, Rushikesh Katikar, Ch. Purushotham
IADIS
2008
13 years 12 months ago
E-Learning In The Field Of E-Business Support
E-business is one important element promoting business competitiveness and is thus closely linked to innovation. However, the potentials of ICT for business processes are not yet ...
Elisabeth Mendoza
IJCAI
2007
13 years 12 months ago
Surprise as Shortcut for Anticipation: Clustering Mental States in Reasoning
To enhance effectiveness in real world applications, autonomous agents have to develop cognitive competencies and anticipatory capabilities. Here we point out their strong liaison...
Michele Piunti, Cristiano Castelfranchi, Rino Falc...