Sciweavers

212 search results - page 41 / 43
» Privacy-Preserving Deep Learning
Sort
View
SECON
2008
IEEE
14 years 4 months ago
Optimal Buffer Management Policies for Delay Tolerant Networks
—Delay Tolerant Networks are wireless networks where disconnections may occur frequently due to propagation phenomena, node mobility, and power outages. Propagation delays may al...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...
IJCNN
2006
IEEE
14 years 3 months ago
Biologically Inspired KFLANN Place Fields for Robot Localization
– This paper presents a hippocampal inspired robot localization model that provides a means for a simple robotic platform with ultrasonic sensors to localize itself. There have b...
Alex Leng Phuan Tay
CVPR
2012
IEEE
12 years 6 days ago
The use of on-line co-training to reduce the training set size in pattern recognition methods: Application to left ventricle seg
The use of statistical pattern recognition models to segment the left ventricle of the heart in ultrasound images has gained substantial attention over the last few years. The mai...
Gustavo Carneiro, Jacinto C. Nascimento
HRI
2010
ACM
14 years 4 months ago
Psychological intimacy with robots?: using interaction patterns to uncover depth of relation
— This conceptual paper broaches possibilities and limits of establishing psychological intimacy in HRI. Keywords- human-robot interaction, interaction patterns, social and moral...
Peter H. Kahn Jr., Jolina H. Ruckert, Takayuki Kan...
NDSS
2006
IEEE
14 years 3 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah