Sciweavers

2517 search results - page 485 / 504
» Specifying Weak Sets
Sort
View
CVPR
2010
IEEE
13 years 9 months ago
Multi-Task Warped Gaussian Process for Personalized Age Estimation
Automatic age estimation from facial images has aroused research interests in recent years due to its promising potential for some computer vision applications. Among the methods ...
Yu Zhang, Dit-Yan Yeung
AAAI
2007
13 years 9 months ago
Concurrent Action Execution with Shared Fluents
Concurrent action execution is important for plan-length minimization. However, action specifications are often limited to avoid conflicts arising from precondition/effect inter...
Michael Buro, Alexander Kovarsky
FAST
2008
13 years 9 months ago
SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
Akshat Verma, Kaladhar Voruganti, Ramani Routray, ...
ATAL
2008
Springer
13 years 9 months ago
Agent-based models for animal cognition: a proposal and prototype
Animal ecologists have successfully applied agent-based models to many different problems. Often, these focus on issues concerning collective behaviors, environmental interactions...
Elske van der Vaart, Rineke Verbrugge
CCS
2008
ACM
13 years 9 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis