Sciweavers

673 search results - page 93 / 135
» Approximate coherence-based reasoning
Sort
View
MICCAI
2004
Springer
16 years 21 days ago
Human Spine Posture Estimation Method from Human Images to Calculate Physical Forces Working on Vertebrae
This paper describes a method for estimating a human spine posture from human images using a human spine model to compute the rough approximation of the physical forces working on ...
Daisuke Furukawa, Takayuki Kitasaka, Kensaku Mori,...
ICML
2009
IEEE
16 years 19 days ago
Robust bounds for classification via selective sampling
We introduce a new algorithm for binary classification in the selective sampling protocol. Our algorithm uses Regularized Least Squares (RLS) as base classifier, and for this reas...
Nicolò Cesa-Bianchi, Claudio Gentile, Franc...
SIGSOFT
2006
ACM
16 years 17 days ago
Lightweight extraction of syntactic specifications
A method for extracting syntactic specifications from heapmanipulating code is described. The state of the heap is represented as an environment mapping each variable or field to ...
Mana Taghdiri, Robert Seater, Daniel Jackson
STOC
2003
ACM
142views Algorithms» more  STOC 2003»
16 years 4 days ago
Optimal probabilistic fingerprint codes
We construct binary codes for fingerprinting. Our codes for n users that are -secure against c pirates have length O(c2 log(n/ )). This improves the codes proposed by Boneh and Sh...
Gábor Tardos
IEEEIAS
2009
IEEE
15 years 6 months ago
Detecting Stepping-Stone Intruders with Long Connection Chains
: A common technique hacker use is to route their traffic through a chain of stepping-stone hosts. It is generally agreed that there is no valid reason to use a long connection cha...
Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephe...