Sciweavers

4899 search results - page 851 / 980
» Robust normative systems
Sort
View
AAAI
2010
13 years 11 months ago
Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions on combinatorially rich structures such as partitions and covers. It is import...
Felix Brandt, Markus Brill, Edith Hemaspaandra, La...
AAAI
2010
13 years 11 months ago
A Layered Approach to People Detection in 3D Range Data
People tracking is a key technology for autonomous systems, intelligent cars and social robots operating in populated environments. What makes the task difficult is that the appea...
Luciano Spinello, Kai Oliver Arras, Rudolph Triebe...
BNCOD
2007
236views Database» more  BNCOD 2007»
13 years 11 months ago
Wordrank: A Method for Ranking Web Pages Based on Content Similarity
This paper presents WordRank, a new page ranking system, which exploits similarity between interconnected pages. WordRank introduces the model of the ‘biased surfer’ which is ...
Apostolos Kritikopoulos, Martha Sideri, Iraklis Va...
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 11 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
DICTA
2007
13 years 11 months ago
Simplex Optimisation Initialized by Gaussian Mixture for Active Appearance Models
Active appearance model efficiently aligns objects which are previously modelized in images. We use it for Human Machine Interface (face gesture analysis, lips reading) to modeli...
Yasser Aidarous, Sylvain Le Gallou, Renaud S&eacut...