Sciweavers

1888 search results - page 326 / 378
» Proof theory and computational analysis
Sort
View
DRM
2008
Springer
13 years 10 months ago
A decision theoretic framework for analyzing binary hash-based content identification systems
Content identification has many applications, ranging from preventing illegal sharing of copyrighted content on video sharing websites, to automatic identification and tagging of ...
Avinash L. Varna, Ashwin Swaminathan, Min Wu
BCSHCI
2007
13 years 10 months ago
From HCI to media experience: methodological implications
The landscape of interactive technology design and evaluation is expanding. In the past, usability and task efficiency were the main focus for research in human computer interacti...
Elizabeth F. Churchill, Jeffrey Bardzell
CORR
2010
Springer
134views Education» more  CORR 2010»
13 years 8 months ago
Incremental Sampling-based Algorithms for Optimal Motion Planning
During the last decade, incremental sampling-based motion planning algorithms, such as the Rapidly-exploring Random Trees (RRTs), have been shown to work well in practice and to po...
Sertac Karaman, Emilio Frazzoli
CORR
2008
Springer
84views Education» more  CORR 2008»
13 years 8 months ago
The Latent Relation Mapping Engine: Algorithm and Experiments
Many AI researchers and cognitive scientists have argued that analogy is the core of cognition. The most influential work on computational modeling of analogy-making is Structure ...
Peter D. Turney
SOCO
2008
Springer
13 years 8 months ago
Fuzzy linear regression model based on fuzzy scalar product
The new concept and method of imposing imprecise (fuzzy) input and output data upon the conventional linear regression model is proposed in this paper. We introduce the fuzzy scala...
Hsien-Chung Wu