Sciweavers

5550 search results - page 1044 / 1110
» Different Approaches to Proof Systems
Sort
View
78
Voted
DIM
2008
ACM
15 years 1 hour ago
Minimal information disclosure with efficiently verifiable credentials
Public-key based certificates provide a standard way to prove one's identity, as attested by some certificate authority (CA). However, plain certificates provide a binary ide...
David Bauer, Douglas M. Blough, David Cash
UAI
2008
14 years 11 months ago
Dyna-Style Planning with Linear Function Approximation and Prioritized Sweeping
We consider the problem of efficiently learning optimal control policies and value functions over large state spaces in an online setting in which estimates must be available afte...
Richard S. Sutton, Csaba Szepesvári, Alborz...
NIPS
1998
14 years 11 months ago
Semi-Supervised Support Vector Machines
We introduce a semi-supervised support vector machine (S3 VM) method. Given a training set of labeled data and a working set of unlabeled data, S3 VM constructs a support vector m...
Kristin P. Bennett, Ayhan Demiriz
ECAI
2010
Springer
14 years 11 months ago
Learning When to Use Lazy Learning in Constraint Solving
Abstract. Learning in the context of constraint solving is a technique by which previously unknown constraints are uncovered during search and used to speed up subsequent search. R...
Ian P. Gent, Christopher Jefferson, Lars Kotthoff,...
101
Voted
BMCBI
2008
135views more  BMCBI 2008»
14 years 10 months ago
Using Generalized Procrustes Analysis (GPA) for normalization of cDNA microarray data
Background: Normalization is essential in dual-labelled microarray data analysis to remove nonbiological variations and systematic biases. Many normalization methods have been use...
Huiling Xiong, Dapeng Zhang, Christopher J. Martyn...
« Prev « First page 1044 / 1110 Last » Next »