Sciweavers

2011 search results - page 380 / 403
» Universal Reinforcement Learning
Sort
View
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
IJCNLP
2005
Springer
14 years 1 months ago
Inversion Transduction Grammar Constraints for Mining Parallel Sentences from Quasi-Comparable Corpora
Abstract. We present a new implication of Wu’s (1997) Inversion Transduction Grammar (ITG) Hypothesis, on the problem of retrieving truly parallel sentence translations from larg...
Dekai Wu, Pascale Fung
TSD
2005
Springer
14 years 1 months ago
Experimental Evaluation of Tree-Based Algorithms for Intonational Breaks Representation
Abstract. The prosodic specification of an utterance to be spoken by a Textto-Speech synthesis system can be devised in break indices, pitch accents and boundary tones. In particu...
Panagiotis Zervas, Gerasimos Xydas, Nikos Fakotaki...
DIGRA
2005
Springer
14 years 1 months ago
Neomancer: An Exercise in Interdisciplinary Academic Game Development
Academic interest in game development and game studies has grown steadily in recent years, with many institutions now offering courses or programs in this area. To provide a truly...
Michael Katchabaw, Derek Elliott, Stephen Danton
SIGMETRICS
2004
ACM
14 years 1 months ago
Storage device performance prediction with CART models
d Abstract] Mengzhi Wang, Kinman Au, Anastassia Ailamaki, Anthony Brockwell, Christos Faloutsos, and Gregory R. Ganger Carnegie Mellon University This work explores the applicatio...
Mengzhi Wang, Kinman Au, Anastassia Ailamaki, Anth...