Sciweavers

2988 search results - page 506 / 598
» Experiments with a New Boosting Algorithm
Sort
View
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
14 years 7 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
EUSFLAT
2009
184views Fuzzy Logic» more  EUSFLAT 2009»
14 years 7 months ago
Recurrent Neural Kalman Filter Identification and Indirect Adaptive Control of a Continuous Stirred Tank Bioprocess
The aim of this paper is to propose a new Kalman Filter Recurrent Neural Network (KFRNN) topology and a recursive Levenberg-Marquardt (L-M) algorithm of its learning capable to est...
Ieroham S. Baruch, Carlos Román Mariaca Gas...
FLAIRS
2009
14 years 7 months ago
Maintaining Focus: Overcoming Attention Deficit Disorder in Contingent Planning
In our experiments with four well-known systems for solving partially observable planning problems (Contingent-FF, MBP, PKS, and POND), we were greatly surprised to find that they...
Ronald Alford, Ugur Kuter, Dana S. Nau, Elnatan Re...
HCI
2009
14 years 7 months ago
User Reputation Evaluation Using Co-occurrence Feature and Collective Intelligence
It becomes more difficult to find valuable contents in the Web 2.0 environment since lots of inexperienced users provide many unorganized contents. In the previous researches, peop...
Jeong-Won Cha, Hyun-woo Lee, Yo-Sub Han, Laehyun K...
ICCV
2009
IEEE
14 years 7 months ago
Image annotation using multi-label correlated Green's function
Image annotation has been an active research topic in the recent years due to its potentially large impact on both image understanding and web/database image search. In this paper...
Hua Wang, Heng Huang, Chris H. Q. Ding