Sciweavers

1005 search results - page 177 / 201
» Practical Secure Function Evaluation
Sort
View
PKDD
2010
Springer
179views Data Mining» more  PKDD 2010»
13 years 5 months ago
Gaussian Processes for Sample Efficient Reinforcement Learning with RMAX-Like Exploration
Abstract. We present an implementation of model-based online reinforcement learning (RL) for continuous domains with deterministic transitions that is specifically designed to achi...
Tobias Jung, Peter Stone
HCI
2009
13 years 5 months ago
A Comparison of Artifact Reduction Methods for Real-Time Analysis of fNIRS Data
Due to its convenient, low physical restraint, and electric noise tolerant features, functional near-infrared spectroscopy (fNIRS) is expected to be a useful tool in monitoring use...
Takayuki Nozawa, Toshiyuki Kondo
GLOBECOM
2010
IEEE
13 years 5 months ago
Spectrum Aware Opportunistic Routing in Cognitive Radio Networks
Cognitive radio (CR) emerges as a key technology to enhance spectrum efficiency and thus creates opportunistic transmissions over links. Supporting the routing function on top of n...
Shih-Chun Lin, Kwang-Cheng Chen
INTERSPEECH
2010
13 years 2 months ago
On the relation of Bayes risk, word error, and word posteriors in ASR
In automatic speech recognition, we are faced with a wellknown inconsistency: Bayes decision rule is usually used to minimize sentence (word sequence) error, whereas in practice w...
Ralf Schlüter, Markus Nußbaum-Thom, Her...
CVPR
2011
IEEE
12 years 11 months ago
Compact Hashing with Joint Optimization of Search Accuracy and Time
Similarity search, namely, finding approximate nearest neighborhoods, is the core of many large scale machine learning or vision applications. Recently, many research results dem...
Junfeng He, Regunathan Radhakrishnan, Shih-Fu Chan...