Sciweavers

221 search results - page 36 / 45
» The Effects of Multiple Algorithms in the Advanced Encryptio...
Sort
View
IJKDB
2010
170views more  IJKDB 2010»
13 years 5 months ago
Clustering Genes Using Heterogeneous Data Sources
Clustering of gene expression data is a standard exploratory technique used to identify closely related genes. Many other sources of data are also likely to be of great assistance...
Erliang Zeng, Chengyong Yang, Tao Li, Giri Narasim...
ICML
1999
IEEE
14 years 9 months ago
Implicit Imitation in Multiagent Reinforcement Learning
Imitation is actively being studied as an effective means of learning in multi-agent environments. It allows an agent to learn how to act well (perhaps optimally) by passively obs...
Bob Price, Craig Boutilier
TDSC
2010
101views more  TDSC 2010»
13 years 7 months ago
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks
—This paper presents the first hierarchical Byzantine fault-tolerant replication architecture suitable to systems that span multiple wide area sites. The architecture confines ...
Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan ...
CVPR
2007
IEEE
14 years 10 months ago
Contextual Identity Recognition in Personal Photo Albums
We present an efficient probabilistic method for identity recognition in personal photo albums. Personal photos are usually taken under uncontrolled conditions ? the captured face...
Dragomir Anguelov, Kuang-chih Lee, Salih Burak G&o...
EWMF
2003
Springer
14 years 1 months ago
Mining Web Sites Using Wrapper Induction, Named Entities, and Post-processing
This paper presents a novel method for extracting information from collections of Web pages across different sites. Our method uses a standard wrapper induction algorithm and explo...
Georgios Sigletos, Georgios Paliouras, Constantine...