Sciweavers

2131 search results - page 76 / 427
» Immunity for Closed Sets
Sort
View
81
Voted
BC
1999
81views more  BC 1999»
15 years 14 days ago
Error tolerant associative memory
Abstract-- This paper surveys two advanced associative memory models[8][5]. The first model was derived from the projection on a closed convex set spanned by patterns. The second m...
Cheng-Yuan Liou, Shao-Kuo Yuan
SASN
2005
ACM
15 years 6 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
CVPR
2012
IEEE
13 years 3 months ago
An online learned CRF model for multi-target tracking
We introduce an online learning approach for multitarget tracking. Detection responses are gradually associated into tracklets in multiple levels to produce final tracks. Unlike ...
Bo Yang, Ram Nevatia
190
Voted
MLQ
2011
14 years 7 months ago
Weak Borel chromatic numbers
Given a graph G whose set of vertices is a Polish space X, the weak Borel chromatic number of G is the least size of a family of pairwise disjoint G-independent Borel sets that cov...
Stefan Geschke
126
Voted
FCT
2007
Springer
15 years 7 months ago
On the Topological Complexity of Weakly Recognizable Tree Languages
We show that the family of tree languages recognized by weak alternating automata is closed by three set theoretic operations that correspond to sum, multiplication by ordinals <...
Jacques Duparc, Filip Murlak