Sciweavers

AIL
2005
104views more  AIL 2005»
13 years 11 months ago
Argument Based Machine Learning Applied to Law
In this paper we discuss the application of a new machine learning approach - Argument Based Machine Learning - to the legal domain. An experiment using a dataset which has also be...
Martin Mozina, Jure Zabkar, Trevor J. M. Bench-Cap...
IJMMS
2007
96views more  IJMMS 2007»
13 years 11 months ago
Debugging strategies and tactics in a multi-representation software environment
This paper investigates the interplay between high level debugging strategies and low level tactics in the context of a multi
Pablo Romero, Benedict du Boulay, Richard Cox, Rud...
RSA
2006
80views more  RSA 2006»
13 years 11 months ago
Regular subgraphs of random graphs
In this paper, we prove that there exists a function k = (4 + o(1))k such that G(n, /n) contains a k-regular graph with high probability whenever > k. In the case of k = 3, it...
Béla Bollobás, Jeong Han Kim, Jacque...
PRL
2006
105views more  PRL 2006»
13 years 11 months ago
Image processing techniques for metallic object detection with millimetre-wave images
In this paper we present a system for the automatic detection and tracking of metallic objects concealed on moving people in sequences of millimetre-wave images, which can penetra...
Christopher D. Haworth, Yvan R. Petillot, Emanuele...
PRESENCE
2006
111views more  PRESENCE 2006»
13 years 11 months ago
On Consistency and Network Latency in Distributed Interactive Applications: A Survey - Part II
This paper is the second part of a two part paper that documents a detailed survey of the research carried out on consistency and latency in distributed interactive applications (...
Declan Delaney, Tomás Ward, Séamus M...
IGPL
2007
74views more  IGPL 2007»
13 years 11 months ago
The Rules of Logic Composition for the Bayesian Epistemic e-Values
In this paper, the relationship between the e-value of a complex hypothesis, H, and those of its constituent elementary hypotheses, Hj
Wagner Borges, Julio Michael Stern
SCN
2008
Springer
147views Communications» more  SCN 2008»
13 years 11 months ago
New Anonymity Notions for Identity-Based Encryption
ded abstract of this paper appeared in Proceedings of the 6th Conference on Security and Cryptography for Networks (SCN '08)
Malika Izabachène, David Pointcheval
OCLC
2006
44views more  OCLC 2006»
13 years 11 months ago
Cataloging for the masses
Purpose
Robert Fox
IDT
2007
70views more  IDT 2007»
13 years 11 months ago
Ubiquitous command and control
This paper advances the concept of ubiquitous command and control. It further contends that the concept is representative of the command and control systems we will have in the 20...
Dale Lambert, Jason Scholz
JODS
2006
135views Data Mining» more  JODS 2006»
13 years 11 months ago
Managing Uncertainty in Schema Matching with Top-K Schema Mappings
In this paper, we propose to extend current practice in schema matching with the simultaneous use of top-K schema mappings rather than a single best mapping. This is a natural ext...
Avigdor Gal