Sciweavers

1414 search results - page 223 / 283
» Combining Intruder Theories
Sort
View
EMNLP
2009
14 years 7 months ago
Statistical Estimation of Word Acquisition with Application to Readability Prediction
Models of language learning play a central role in a wide range of applications: from psycholinguistic theories of how people acquire new word knowledge, to information systems th...
Paul Kidwell, Guy Lebanon, Kevyn Collins-Thompson
HCI
2009
14 years 7 months ago
Social Adaptation of ERP Software: Tagging UI Elements
Abstract. In this paper we present a newly designed annotation and collaboration component, which has been prototypically implemented on top of an ERP (Enterprise Resource Planning...
Marcus Nitsche, Martin Christof Kindsmüller, ...
ECCV
2010
Springer
14 years 7 months ago
An Efficient Graph Cut Algorithm for Computer Vision Problems
Abstract. Graph cuts has emerged as a preferred method to solve a class of energy minimization problems in computer vision. It has been shown that graph cut algorithms designed kee...
Chetan Arora, Subhashis Banerjee, Prem Kalra, S. N...
FIRSTMONDAY
2010
125views more  FIRSTMONDAY 2010»
14 years 7 months ago
The social environment model: Small heroes and the evolution of human society
Traditional "realistic" theories of social action, whether based on the individual gain heuristics of capitalism or the collective class struggles of communism, cannot e...
Brian Whitworth, Alex P. Whitworth
CDC
2010
IEEE
226views Control Systems» more  CDC 2010»
14 years 4 months ago
Fast primal-dual projected linear iterations for distributed consensus in constrained convex optimization
In this paper we study the constrained consensus problem, i.e. the problem of reaching a common point from the estimates generated by multiple agents that are constrained to lie in...
Ion Necoara, Ioan Dumitrache, Johan A. K. Suykens