Sciweavers

9521 search results - page 372 / 1905
» Compiling with continuations, continued
Sort
View
ICIP
2009
IEEE
16 years 5 months ago
Security Evaluation Of Informed Watermarking Schemes
In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the se...
126
Voted
ICML
2003
IEEE
16 years 5 months ago
Hierarchical Policy Gradient Algorithms
Hierarchical reinforcement learning is a general framework which attempts to accelerate policy learning in large domains. On the other hand, policy gradient reinforcement learning...
Mohammad Ghavamzadeh, Sridhar Mahadevan
KDD
2009
ACM
217views Data Mining» more  KDD 2009»
16 years 4 months ago
Efficient anomaly monitoring over moving object trajectory streams
Lately there exist increasing demands for online abnormality monitoring over trajectory streams, which are obtained from moving object tracking devices. This problem is challengin...
Yingyi Bu, Lei Chen 0002, Ada Wai-Chee Fu, Dawei L...
CHI
2004
ACM
16 years 4 months ago
Pressure widgets
Current user interface widgets typically assume that the input device can only provide x-y position and binary button press information. Other inputs such as the continuous pressu...
Gonzalo Ramos, Matthew Boulos, Ravin Balakrishnan
VLDB
2003
ACM
113views Database» more  VLDB 2003»
16 years 4 months ago
PSoup: a system for streaming queries over streaming data
Recent work on querying data streams has focused on systems where newly arriving data is processed and continuously streamed to the user in real time. In many emerging applications...
Sirish Chandrasekaran, Michael J. Franklin