Sciweavers

303 search results - page 41 / 61
» Unifying Theories of Confidentiality
Sort
View
DAC
2005
ACM
14 years 10 months ago
A lattice-based framework for the classification and design of asynchronous pipelines
This paper presents a unifying framework for the modeling of asynchronous pipeline circuits. A pipeline protocol is captured in a graph-based model which defines the partial order...
Peggy B. McGee, Steven M. Nowick
MICCAI
2004
Springer
14 years 10 months ago
Real-Time Multi-model Tracking of Myocardium in Echocardiography Using Robust Information Fusion
Automatic myocardial wall motion tracking in ultrasound images is an important step in analysis of the heart function. Existing methods for Myocardial Wall Tracking are not robust ...
Bogdan Georgescu, Xiang Sean Zhou, Dorin Comaniciu...
ICML
2005
IEEE
14 years 10 months ago
Proto-value functions: developmental reinforcement learning
This paper presents a novel framework called proto-reinforcement learning (PRL), based on a mathematical model of a proto-value function: these are task-independent basis function...
Sridhar Mahadevan
WWW
2007
ACM
14 years 10 months ago
Integrating web directories by learning their structures
Documents in the Web are often organized using category trees by information providers (e.g. CNN, BBC) or search engines (e.g. Google, Yahoo!). Such category trees are commonly kn...
Christopher C. Yang, Jianfeng Lin
PODS
2009
ACM
134views Database» more  PODS 2009»
14 years 10 months ago
Equivalence of nested queries with mixed semantics
We consider the problem of deciding query equivalence for a conjunctive language in which queries output complex objects composed from a mixture of nested, unordered collection ty...
David DeHaan