Sciweavers

661 search results - page 106 / 133
» Robustness Guarantees for Anonymity
Sort
View
CCS
2008
ACM
13 years 10 months ago
VEP: a virtual machine for extended proof-carrying code
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating the proofs which are inherently larg...
Heidar Pirzadeh, Danny Dubé
LREC
2010
225views Education» more  LREC 2010»
13 years 10 months ago
The Architecture of FunGramKB
Natural language understanding systems require a knowledge base provided with conceptual representations reflecting the structure of human beings' cognitive system. Although ...
Carlos Periñán-Pascual, Francisco Ar...
LREC
2008
133views Education» more  LREC 2008»
13 years 10 months ago
Comparing Set-Covering Strategies for Optimal Corpus Design
This article is interested in the problem of the linguistic content of a speech corpus. Depending on the target task, the phonological and linguistic content of the corpus is cont...
Jonathan Chevelu, Nelly Barbot, Olivier Boëff...
NIPS
2008
13 years 10 months ago
Estimating the Location and Orientation of Complex, Correlated Neural Activity using MEG
The synchronous brain activity measured via MEG (or EEG) can be interpreted as arising from a collection (possibly large) of current dipoles or sources located throughout the cort...
David P. Wipf, Julia Owen, Hagai Attias, Kensuke S...
AAAI
2006
13 years 10 months ago
Strong Mediated Equilibrium
Providing agents with strategies that will be robust against deviations by coalitions is central to the design of multi-agent agents. However, such strategies, captured by the not...
Dov Monderer, Moshe Tennenholtz