Sciweavers

732 search results - page 59 / 147
» corr 2011
Sort
View
CORR
2011
Springer
158views Education» more  CORR 2011»
14 years 7 months ago
Exploiting Conceptual Knowledge for Querying Information Systems
Whereas today’s information systems are well-equipped for efficient query handling, their strict mathematical foundations hamper their use for everyday tasks. In daily life, peop...
Joachim Selke, Wolf-Tilo Balke
CORR
2011
Springer
222views Education» more  CORR 2011»
14 years 7 months ago
Weakly Supervised Learning of Foreground-Background Segmentation using Masked RBMs
Abstract. We propose an extension of the Restricted Boltzmann Machine (RBM) that allows the joint shape and appearance of foreground objects in cluttered images to be modeled indep...
Nicolas Heess, Nicolas Le Roux, John M. Winn
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 7 months ago
Percolation in the Secrecy Graph
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
Amites Sarkar, Martin Haenggi
CORR
2011
Springer
156views Education» more  CORR 2011»
14 years 10 months ago
Discrete Time Elastic Vector Spaces
This paper proposes a framework dedicated to the construction of what we call time elastic inner products allowing one to embed sets of non-uniformly sampled multivariate time ser...
Pierre-François Marteau
110
Voted
CORR
2011
Springer
156views Education» more  CORR 2011»
14 years 10 months ago
Extensional Collapse Situations I: non-termination and unrecoverable errors
Abstract. We consider a simple model of higher order, functional computations over the booleans. Then, we enrich the model in order to encompass non-termination and unrecoverable e...
Antonio Bucciarelli