Sciweavers

2988 search results - page 506 / 598
» Experiments with a New Boosting Algorithm
Sort
View
137
Voted
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
15 years 16 days ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
146
Voted
EUSFLAT
2009
184views Fuzzy Logic» more  EUSFLAT 2009»
15 years 16 days ago
Recurrent Neural Kalman Filter Identification and Indirect Adaptive Control of a Continuous Stirred Tank Bioprocess
The aim of this paper is to propose a new Kalman Filter Recurrent Neural Network (KFRNN) topology and a recursive Levenberg-Marquardt (L-M) algorithm of its learning capable to est...
Ieroham S. Baruch, Carlos Román Mariaca Gas...
116
Voted
FLAIRS
2009
15 years 15 days ago
Maintaining Focus: Overcoming Attention Deficit Disorder in Contingent Planning
In our experiments with four well-known systems for solving partially observable planning problems (Contingent-FF, MBP, PKS, and POND), we were greatly surprised to find that they...
Ronald Alford, Ugur Kuter, Dana S. Nau, Elnatan Re...
HCI
2009
15 years 15 days ago
User Reputation Evaluation Using Co-occurrence Feature and Collective Intelligence
It becomes more difficult to find valuable contents in the Web 2.0 environment since lots of inexperienced users provide many unorganized contents. In the previous researches, peop...
Jeong-Won Cha, Hyun-woo Lee, Yo-Sub Han, Laehyun K...
159
Voted
ICCV
2009
IEEE
15 years 14 days ago
Image annotation using multi-label correlated Green's function
Image annotation has been an active research topic in the recent years due to its potentially large impact on both image understanding and web/database image search. In this paper...
Hua Wang, Heng Huang, Chris H. Q. Ding