Sciweavers

292 search results - page 25 / 59
» A linearization of the Lambda-calculus and consequences
Sort
View
ICDM
2002
IEEE
118views Data Mining» more  ICDM 2002»
15 years 6 months ago
Mining Surveillance Video for Independent Motion Detection
This paper addresses the special applications of data mining techniques in homeland defense. The problem targeted, which is frequently encountered in military/intelligence surveil...
Zhongfei Zhang
AUSAI
2001
Springer
15 years 5 months ago
Wrapping Boosters against Noise
Abstract. Wrappers have recently been used to obtain parameter optimizations for learning algorithms. In this paper we investigate the use of a wrapper for estimating the correct n...
Bernhard Pfahringer, Geoffrey Holmes, Gabi Schmidb...
CSL
2001
Springer
15 years 5 months ago
Beyond Regularity: Equational Tree Automata for Associative and Commutative Theories
Abstract. A new tree automata framework, called equational tree automata, is presented. In the newly introduced setting, congruence closures of recognizable tree languages are reco...
Hitoshi Ohsaki
COLT
1992
Springer
15 years 5 months ago
On the Computational Power of Neural Nets
This paper deals with finite size networks which consist of interconnections of synchronously evolving processors. Each processor updates its state by applying a "sigmoidal&q...
Hava T. Siegelmann, Eduardo D. Sontag
CCS
2004
ACM
15 years 5 months ago
Group signatures with verifier-local revocation
Group signatures have recently become important for enabling privacy-preserving attestation in projects such as Microsoft's ngscb effort (formerly Palladium). Revocation is c...
Dan Boneh, Hovav Shacham