Sciweavers

20833 search results - page 243 / 4167
» Hidden process models
Sort
View
ISW
2009
Springer
15 years 11 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
MIDDLEWARE
2009
Springer
15 years 11 months ago
Why Do Upgrades Fail and What Can We Do about It?
Abstract. Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading ca...
Tudor Dumitras, Priya Narasimhan
ISMAR
2007
IEEE
15 years 10 months ago
Visualizing Occluded Physical Objects in Unfamiliar Outdoor Augmented Reality Environments
This paper describes techniques to allow both the visualization of hidden objects, and removal of real objects, for a mobile augmented reality user. A gesture based technique is a...
Ben Avery, Wayne Piekarski, Bruce H. Thomas
JMLR
2012
13 years 6 months ago
Deep Learning Made Easier by Linear Transformations in Perceptrons
We transform the outputs of each hidden neuron in a multi-layer perceptron network to have zero output and zero slope on average, and use separate shortcut connections to model th...
Tapani Raiko, Harri Valpola, Yann LeCun
AIPS
2000
15 years 5 months ago
On-line Scheduling via Sampling
1 We consider the problem of scheduling an unknown sequence of tasks for a single server as the tasks arrive with the goal off maximizing the total weighted value of the tasks serv...
Hyeong Soo Chang, Robert Givan, Edwin K. P. Chong