Sciweavers

2882 search results - page 205 / 577
» Enhancements to the Voting Algorithm
Sort
View
ICML
2010
IEEE
15 years 5 months ago
Multi-agent Learning Experiments on Repeated Matrix Games
This paper experimentally evaluates multiagent learning algorithms playing repeated matrix games to maximize their cumulative return. Previous works assessed that Qlearning surpas...
Bruno Bouzy, Marc Métivier
172
Voted
IJCAI
2003
15 years 5 months ago
Coherent Keyphrase Extraction via Web Mining
Keyphrases are useful for a variety of purposes, including summarizing, indexing, labeling, categorizing, clustering, highlighting, browsing, and searching. The task of automatic ...
Peter D. Turney
ICIP
2009
IEEE
16 years 5 months ago
New Results On Performance Analysis Of Super-resolution Image Reconstruction
In this paper, we present new results in performance analysis of super-resolution (SR) image reconstruction. We investigate bounds on the improvement in resolution that can be ach...
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
15 years 11 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...
ISCAS
2008
IEEE
124views Hardware» more  ISCAS 2008»
15 years 11 months ago
Musical beat tracking via Kalman filtering and noisy measurements selection
— We study the problem of automatic musical beat tracking from acoustic data, i.e., finding locations of beats of a music piece by computers on-the-fly, in this work. An online...
Yu Shiu, C. C. Jay Kuo