Sciweavers

CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 8 months ago
Redundancies in Dependently Typed Lambda Calculi and Their Relevance to Proof Search
Dependently typed -calculi such as the Logical Framework (LF) are capable of representing relationships between terms through types. By exploiting the "formulas-as-types"...
Zachary Snow, David Baelde, Gopalan Nadathur
CORR
2010
Springer
125views Education» more  CORR 2010»
13 years 8 months ago
Local search for stable marriage problems with ties and incomplete lists
The stable marriage problem has a wide variety of practical applications, ranging from matching resident doctors to hospitals, to matching students to schools, or more generally to...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 8 months ago
Image Pixel Fusion for Human Face Recognition
In this paper we present a technique for fusion of optical and thermal face images based on image pixel fusion approach. Out of several factors, which affect face recognition perfo...
Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita...
CORR
2010
Springer
115views Education» more  CORR 2010»
13 years 8 months ago
Online Cake Cutting
We propose an online form of the cake cutting problem. This models situations where players arrive and depart during the process of dividing a resource. We show that well known fa...
Toby Walsh
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 8 months ago
Symmetry within and between solutions
Symmetry can be used to help solve many problems. For instance, Einstein's famous 1905 paper ("On the Electrodynamics of Moving Bodies") uses symmetry to help derive...
Toby Walsh
CORR
2010
Springer
130views Education» more  CORR 2010»
13 years 8 months ago
Decomposition of the NVALUE constraint
We study decompositions of the global NVALUE constraint. Our main contribution is theoretical: we show that there are propagators for global constraints like NVALUE which decomposi...
Christian Bessiere, George Katsirelos, Nina Narody...
CORR
2010
Springer
76views Education» more  CORR 2010»
13 years 8 months ago
Query Strategies for Evading Convex-Inducing Classifiers
Classifiers are often used to detect miscreant activities. We study how an adversary can systematically query a classifier to elicit information that allows the adversary to evade...
Blaine Nelson, Benjamin I. P. Rubinstein, Ling Hua...
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 8 months ago
Repairing People Trajectories Based on Point Clustering
This paper presents a method for improving any object tracking algorithm based on machine learning. During the training phase, important trajectory features are extracted which are...
Duc Phu Chau, François Brémond, Etie...
CORR
2010
Springer
185views Education» more  CORR 2010»
13 years 8 months ago
Pseudorandom generators and the BQP vs. PH problem
It is a longstanding open problem to devise an oracle relative to which BQP does not lie in the Polynomial-Time Hierarchy (PH). We advance a natural conjecture about the capacity ...
Bill Fefferman, Christopher Umans