Sciweavers

174 search results - page 11 / 35
» Practically Perfect
Sort
View
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 8 months ago
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
Shengbao Wang, Zhenfu Cao, Haiyong Bao
ECCV
2010
Springer
14 years 1 months ago
Weakly-Paired Maximum Covariance Analysis for Multimodal Dimensionality Reduction and Transfer
Abstract. We study the problem of multimodal dimensionality reduction assuming that data samples can be missing at training time, and not all data modalities may be present at appl...
ECCV
2010
Springer
13 years 9 months ago
Weakly-Paired Maximum Covariance Analysis for Multimodal Dimensionality Reduction and Transfer Learning
Abstract. We study the problem of multimodal dimensionality reduction assuming that data samples can be missing at training time, and not all data modalities may be present at appl...
Christoph H. Lampert, Oliver Krömer
ICML
2005
IEEE
14 years 9 months ago
Bayesian sparse sampling for on-line reward optimization
We present an efficient "sparse sampling" technique for approximating Bayes optimal decision making in reinforcement learning, addressing the well known exploration vers...
Tao Wang, Daniel J. Lizotte, Michael H. Bowling, D...
ICIAR
2009
Springer
14 years 3 months ago
Scale Invariant Feature Transform with Irregular Orientation Histogram Binning
The SIFT (Scale Invariant Feature Transform) descriptor is a widely used method for matching image features. However, perfect scale invariance can not be achieved in practice becau...
Yan Cui, Nils Hasler, Thorsten Thormählen, Ha...