Sciweavers

2927 search results - page 538 / 586
» Secure Distributed Human Computation
Sort
View
ICML
2009
IEEE
14 years 10 months ago
Factored conditional restricted Boltzmann Machines for modeling motion style
The Conditional Restricted Boltzmann Machine (CRBM) is a recently proposed model for time series that has a rich, distributed hidden state and permits simple, exact inference. We ...
Graham W. Taylor, Geoffrey E. Hinton
SIGSOFT
2004
ACM
14 years 10 months ago
Implementing protocols via declarative event patterns
This paper introduces declarative event patterns (DEPs) as a means to implement protocols while improving their traceability, comprehensibility, and maintainability. DEPs are desc...
Robert J. Walker, Kevin Viggers
ISBI
2006
IEEE
14 years 9 months ago
A statistical appearance model based on intensity quantile histograms
We present a novel histogram method for statistically characterizing the appearance of deformable models. In deformable model segmentation, appearance models measure the likelihoo...
Robert E. Broadhurst, Joshua Stough, Stephen M. Pi...
WWW
2003
ACM
14 years 9 months ago
Dynamic service reconfiguration for wireless web access
This paper describes a dynamic service reconfiguration model where the proxy is composed of a chain of service objects called mobilets (pronounced as mo-be-lets), which can be dep...
Siu Nam Chuang, Alvin T. S. Chan, Jiannong Cao, Ro...
ICSE
2008
IEEE-ACM
14 years 9 months ago
Answering common questions about code
Difficulties understanding update paths while understanding code cause developers to waste time and insert bugs. A detailed investigation of these difficulties suggests that a wid...
Thomas D. LaToza