Sciweavers

10907 search results - page 2080 / 2182
» Constraint Based Strategies
Sort
View
JAIR
2008
135views more  JAIR 2008»
14 years 10 months ago
On Similarities between Inference in Game Theory and Machine Learning
In this paper, we elucidate the equivalence between inference in game theory and machine learning. Our aim in so doing is to establish an equivalent vocabulary between the two dom...
Iead Rezek, David S. Leslie, Steven Reece, Stephen...
CORR
2007
Springer
113views Education» more  CORR 2007»
14 years 10 months ago
Communication under Strong Asynchronism
We consider asynchronous communication over point-to-point discrete memoryless channels without feedback. The transmitter starts sending one block codeword at an instant that is u...
Aslan Tchamkerten, Venkat Chandar, Gregory W. Worn...
ISI
2006
Springer
14 years 10 months ago
Measures to Detect Word Substitution in Intercepted Communication
Abstract. Those who want to conceal the content of their communications can do so by replacing words that might trigger attention by other words or locutions that seem more ordinar...
SzeWang Fong, David B. Skillicorn, Dmitri Roussino...
IVC
2006
120views more  IVC 2006»
14 years 10 months ago
Face recognition by fusing thermal infrared and visible imagery
Thermal infrared (IR) imagery offers a promising alternative to visible imagery for face recognition due to its relative insensitive to variations in face appearance caused by ill...
George Bebis, Aglika Gyaourova, Saurabh Singh, Ioa...
JNW
2008
71views more  JNW 2008»
14 years 10 months ago
Enhancement of Delivery of Warning Messages for Mobile Networks
Vehicle-to-vehicle (V2V) communication systems have been studied extensively in recent years by transportation experts worldwide. Such systems enable the transmission of warning me...
Chia-Sheng Tsai, Wun-Kai Du
« Prev « First page 2080 / 2182 Last » Next »