Sciweavers

674 search results - page 35 / 135
» From Constructibility and Absoluteness to Computability and ...
Sort
View
FOCS
2009
IEEE
15 years 8 months ago
2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness
Abstract— We show how to efficiently extract truly random bits from two independent sources of linear min-entropy, under a computational assumption. The assumption we rely on is...
Yael Tauman Kalai, Xin Li, Anup Rao
UAI
2007
15 years 3 months ago
User-Centered Methods for Rapid Creation and Validation of Bayesian Belief Networks
Bayesian networks (BN) are particularly well suited to capturing vague and uncertain knowledge. However, the capture of this knowledge and associated reasoning from human domain e...
Jonathan D. Pfautz, Zach Cox, Geoffrey Catto, Davi...
TKDE
1998
134views more  TKDE 1998»
15 years 1 months ago
Unified Data Model for Representing Multimedia, Timeline, and Simulation Data
—This paper describes a unified data model that represents multimedia, timeline, and simulation data utilizing a single set of related data modeling constructs. A uniform model f...
John D. N. Dionisio, Alfonso F. Cardenas
AO
2005
147views more  AO 2005»
15 years 1 months ago
Domain modelling and NLP: Formal ontologies? Lexica? Or a bit of both?
There are a number of genuinely open questions concerning the use of domain models in nlp. It would be great if contributors to Applied Ontology could help addressing them rather ...
Massimo Poesio
CIMAGING
2008
122views Hardware» more  CIMAGING 2008»
15 years 3 months ago
Online consistency checking for AM-FM target tracks
We compute AM-FM models for infrared video frames depicting military targets immersed in structured clutter backgrounds. We show that independent correlation based detection proce...
Nick A. Mould, Chuong T. Nguyen, Colin M. Johnston...