Sciweavers

60 search results - page 7 / 12
» escape 2007
Sort
View
NIPS
1998
13 years 11 months ago
Multi-Electrode Spike Sorting by Clustering Transfer Functions
A new paradigm is proposed for sorting spikes in multi-electrode data using ratios of transfer functions between cells and electrodes. It is assumed that for every cell and electr...
Dmitry Rinberg, Hanan Davidowitz, Naftali Tishby
CCCG
2006
13 years 11 months ago
An Optimal Solution to Room Search Problem
A room is a simple polygon with a prespecified point, called the door, on its boundary. A search starts at the door and must detect any intruder that may be in the room, while maki...
Binay K. Bhattacharya, John Z. Zhang, Qiaosheng Sh...
NIPS
2004
13 years 11 months ago
Sampling Methods for Unsupervised Learning
We present an algorithm to overcome the local maxima problem in estimating the parameters of mixture models. It combines existing approaches from both EM and a robust fitting algo...
Robert Fergus, Andrew Zisserman, Pietro Perona
SEC
2003
13 years 11 months ago
Secure Audit Logging with Tamper-Resistant Hardware
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights ho...
Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
ACL
1989
13 years 11 months ago
Automatic Acquisition of the Lexical Semantics of Verbs from Sentence Frames
This paper presents a computational model ofverb acquisitionwhich uses what we willcallthe principle of structured overeommitment to eliminate the need for negative evidence. The ...
Mort Webster, Mitchell P. Marcus