Sciweavers

1042 search results - page 103 / 209
» Failing First: An Update
Sort
View
AAAI
2010
15 years 2 months ago
Security Games with Arbitrary Schedules: A Branch and Price Approach
Security games, and important class of Stackelberg games, are used in deployed decision-support tools in use by LAX police and the Federal Air Marshals Service. The algorithms use...
Manish Jain, Erim Kardes, Christopher Kiekintveld,...
CVHI
2007
15 years 2 months ago
Body Mounted Vision System for Visually Impaired Outdoor and Indoor Wayfinding Assistance
: The most challenging issue of the navigation assistive systems for the visually impaired is the instantaneous and accurate spatial localization of the user. Most of the previous ...
Sylvie Treuillet, Eric Royer, Thierry Chateau, Mic...
76
Voted
LREC
2010
161views Education» more  LREC 2010»
15 years 2 months ago
Online Japanese Unknown Morpheme Detection using Orthographic Variation
To solve the unknown morpheme problem in Japanese morphological analysis, we previously proposed a novel framework of online unknown morpheme acquisition and its implementation. T...
Yugo Murawaki, Sadao Kurohashi
104
Voted
ICISC
2008
89views Cryptology» more  ICISC 2008»
15 years 2 months ago
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure group communication. GKA is very useful in many types of peer group scenar...
Jihye Kim, Gene Tsudik
84
Voted
NIPS
2007
15 years 2 months ago
Structured Learning with Approximate Inference
In many structured prediction problems, the highest-scoring labeling is hard to compute exactly, leading to the use of approximate inference methods. However, when inference is us...
Alex Kulesza, Fernando Pereira