Sciweavers

882 search results - page 16 / 177
» Visibility-driven transfer functions
Sort
View
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
14 years 8 months ago
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be st...
Yehuda Lindell, Hila Zarosim
INFOCOM
2000
IEEE
14 years 2 days ago
Modeling TCP Latency
—Several analytic models describe the steady-state throughput of bulk transfer TCP flows as a function of round trip time and packet loss rate. These models describe flows base...
Neal Cardwell, Stefan Savage, Thomas E. Anderson
CVPR
2008
IEEE
14 years 9 months ago
Transfer learning for image classification with sparse prototype representations
To learn a new visual category from few examples, prior knowledge from unlabeled data as well as previous related categories may be useful. We develop a new method for transfer le...
Ariadna Quattoni, Michael Collins, Trevor Darrell
ATAL
2007
Springer
14 years 1 months ago
Transfer via inter-task mappings in policy search reinforcement learning
The ambitious goal of transfer learning is to accelerate learning on a target task after training on a different, but related, source task. While many past transfer methods have f...
Matthew E. Taylor, Shimon Whiteson, Peter Stone
ICIP
2006
IEEE
14 years 9 months ago
Sparse Image Reconstruction for Partially known Blur Functions
In this paper, we consider the problem of image reconstruction from the noisy blurred version of an original image when the blurring operator is partially known and the original i...
Raviv Raich, Alfred O. Hero