abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Semi-supervised classification uses aspects of both unsupervised and supervised learning to improve upon the performance of traditional classification methods. Semi-supervised clu...
We develop an optical flow estimation framework that focuses on motion estimation over time formulated in a Dynamic Bayesian Network. It realizes a spatiotemporal integration of ...
Volker Willert, Marc Toussaint, Julian Eggert, Edg...
In many systems such as PDAs, users access data through a limited viewport. This means that users have to frequently navigate to regions that are off-screen to view important conte...
Grant Partridge, Mahtab Nezhadasl, Pourang Irani, ...
Bayesian network classifiers have been widely used for classification problems. Given a fixed Bayesian network structure, parameters learning can take two different approaches: ge...
Jiang Su, Harry Zhang, Charles X. Ling, Stan Matwi...