Sciweavers

9842 search results - page 1837 / 1969
» The Complexity of the Matching-Cut Problem
Sort
View
FOCS
2003
IEEE
14 years 3 months ago
Bounded-Concurrent Secure Two-Party Computation in a Constant Number of Rounds
We consider the problem of constructing a general protocol for secure two-party computation in a way that preserves security under concurrent composition. In our treatment, we foc...
Rafael Pass, Alon Rosen
HICSS
2003
IEEE
123views Biometrics» more  HICSS 2003»
14 years 3 months ago
Issues in Rational Planning in Multi-Agent Settings
We adopt the decision-theoretic principle of expected utility maximization as a paradigm for designing autonomous rational agents operating in multi-agent environments. We use the...
Piotr J. Gmytrasiewicz
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
14 years 3 months ago
Automatic Mediation between Incompatible Component Interaction Styles
Incompatibility of component interaction styles is identified as a major obstacle to interoperability when using off-the-shelf components or dealing with legacy software in compos...
Klaus-Peter Löhr
ICDAR
2003
IEEE
14 years 3 months ago
Best Practices for Convolutional Neural Networks Applied to Visual Document Analysis
Neural networks are a powerful technology for classification of visual inputs arising from documents. However, there is a confusing plethora of different neural network methods th...
Patrice Simard, David Steinkraus, John C. Platt
ICDM
2003
IEEE
104views Data Mining» more  ICDM 2003»
14 years 3 months ago
Localized Prediction of Continuous Target Variables Using Hierarchical Clustering
In this paper, we propose a novel technique for the efficient prediction of multiple continuous target variables from high-dimensional and heterogeneous data sets using a hierarch...
Aleksandar Lazarevic, Ramdev Kanapady, Chandrika K...
« Prev « First page 1837 / 1969 Last » Next »