Sciweavers

1134 search results - page 196 / 227
» Distributed Proving in Access-Control Systems
Sort
View
DAC
2008
ACM
16 years 22 days ago
Specify-explore-refine (SER): from specification to implementation
Driven by increasing complexity and reliability demands, the Japanese Aerospace Exploration Agency (JAXA) in 2004 commissioned development of ELEGANT, a complete SpecC-based envir...
Andreas Gerstlauer, Junyu Peng, Dongwan Shin, Dani...
ICCV
2005
IEEE
16 years 1 months ago
Integration of Conditionally Dependent Object Features for Robust Figure/Background Segmentation
We propose a new technique for fusing multiple cues to robustly segment an object from its background in video sequences that suffer from abrupt changes of both illumination and p...
Francesc Moreno-Noguer, Alberto Sanfeliu, Dimitris...
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
16 years 1 months ago
Robust Runtime Optimization of Data Transfer in Queries over Web Services
Self-managing solutions have recently attracted a lot of interest from the database community. The need for self-* properties is more evident in distributed applications comprising...
Anastasios Gounaris, Christos Yfoulis, Rizos Sakel...
ICML
2009
IEEE
16 years 16 days ago
Near-Bayesian exploration in polynomial time
We consider the exploration/exploitation problem in reinforcement learning (RL). The Bayesian approach to model-based RL offers an elegant solution to this problem, by considering...
J. Zico Kolter, Andrew Y. Ng
ICLP
2009
Springer
16 years 11 days ago
Using Histograms to Better Answer Queries to Probabilistic Logic Programs
Probabilistic logic programs (PLPs) define a set of probability distribution functions (PDFs) over the set of all Herbrand interpretations of the underlying logical language. When...
Matthias Broecheler, Gerardo I. Simari, V. S. Subr...