Sciweavers

528 search results - page 77 / 106
» What Can We Learn Privately
Sort
View
RAS
2006
108views more  RAS 2006»
13 years 9 months ago
A computational model of intention reading in imitation
Imitation in artificial systems involves a number of important aspects, such as extracting the relevant features of the demonstrated behaviour, inverse mapping observations, and e...
Bart Jansen, Tony Belpaeme
EUROSEC
2010
ACM
14 years 4 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...
AICOM
2002
103views more  AICOM 2002»
13 years 9 months ago
The emergent computational potential of evolving artificial living systems
The computational potential of artificial living systems can be studied without knowing the algorithms that govern their behavior. Modeling single organisms by means of socalled c...
Jirí Wiedermann, Jan van Leeuwen
SYNASC
2007
IEEE
136views Algorithms» more  SYNASC 2007»
14 years 3 months ago
Wikipedia-Based Kernels for Text Categorization
In recent years several models have been proposed for text categorization. Within this, one of the widely applied models is the vector space model (VSM), where independence betwee...
Zsolt Minier, Zalan Bodo, Lehel Csató
AVI
2004
13 years 11 months ago
Scaffolding visually cluttered web pages to facilitate accessibility
Increasingly, rich and dynamic content and abundant links are making Web pages visually cluttered and widening the accessibility divide for the disabled and people with impairment...
Alison Lee