Sciweavers

2539 search results - page 214 / 508
» Debugging Method Names
Sort
View
TIT
2008
147views more  TIT 2008»
15 years 3 months ago
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, the connections between codes, matroids, and a special cla...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
TKDE
2008
234views more  TKDE 2008»
15 years 3 months ago
Probabilistic Group Nearest Neighbor Queries in Uncertain Databases
The importance of query processing over uncertain data has recently arisen due to its wide usage in many real-world applications. In the context of uncertain databases, previous wo...
Xiang Lian, Lei Chen 0002
JETAI
2002
69views more  JETAI 2002»
15 years 2 months ago
The interaction of representations and planning objectives for decision-theoretic planning tasks
We study decision-theoretic planning or reinforcement learning in the presence of traps such as steep slopes for outdoor robots or staircases for indoor robots. In this case, achi...
Sven Koenig, Yaxin Liu
ICMCS
2009
IEEE
189views Multimedia» more  ICMCS 2009»
15 years 27 days ago
Emotion recognition from speech VIA boosted Gaussian mixture models
Gaussian mixture models (GMMs) and the minimum error rate classifier (i.e. Bayesian optimal classifier) are popular and effective tools for speech emotion recognition. Typically, ...
Hao Tang, Stephen M. Chu, Mark Hasegawa-Johnson, T...
EJWCN
2010
156views more  EJWCN 2010»
14 years 10 months ago
On Performance Modeling of Ad Hoc Routing Protocols
Simulation studies have been the predominant method of evaluating ad hoc routing algorithms. Despite their wide use and merits, simulations are generally time consuming. Furthermo...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq