Sciweavers

117 search results - page 16 / 24
» Why Cryptosystems Fail
Sort
View
IJCAI
1989
13 years 9 months ago
Coping With Uncertainty in Map Learning
In many applications in mobile robotics, it is important for a robot to explore its environment in order to construct a representation of space useful for guiding movement. We refe...
Kenneth Basye, Thomas Dean, Jeffrey Scott Vitter
IJIM
2008
60views more  IJIM 2008»
13 years 8 months ago
The Role of Podcasts in Students' Learning
Podcasts have been employed extensively in some countries and are now being trialed at a number of universities in Australia. They allow ubiquitous learning whereby students can ac...
Laurel Evelyn Dyson
IJCV
2000
133views more  IJCV 2000»
13 years 8 months ago
Heteroscedastic Regression in Computer Vision: Problems with Bilinear Constraint
We present an algorithm to estimate the parameters of a linear model in the presence of heteroscedastic noise, i.e., each data point having a different covariance matrix. The algor...
Yoram Leedan, Peter Meer
JECR
2000
136views more  JECR 2000»
13 years 8 months ago
Modeling the Supply-Demand Interaction in Electronic Commerce: A Bi-Level Programming Approach
The purpose of this paper consists in establishing the model for the supply-demand interaction in the age of electronic commerce. First of all, the study uses the individual objec...
Daniel Y. Shee, Tzung-I Tang, Gwo-Hshiung Tzeng
SYNTHESE
2008
81views more  SYNTHESE 2008»
13 years 7 months ago
The inclosure scheme and the solution to the paradoxes of self-reference
All paradoxes of self-reference seem to share some structural features. Russell in 1908 and especially Priest nowadays have advanced structural descriptions that successfully ident...
Jordi Valor Abad