Sciweavers

1088 search results - page 65 / 218
» Independence of Negative Constraints
Sort
View
ICMCS
2007
IEEE
190views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Video Event Detection with Combined Distance-Based and Rule-Based Data Mining Techniques
In this paper, the rare event detection issue in video event detection is addressed through the proposed data mining framework which can be generalized to be domain independent. T...
Zongxing Xie, Mei-Ling Shyu, Shu-Ching Chen
RULEML
2005
Springer
15 years 3 months ago
A Realistic Architecture for the Semantic Web
In this paper we argue that a realistic architecture for the Semantic Web must be based on multiple independent, but interoperable, stacks of languages. In particular, we argue tha...
Michael Kifer, Jos de Bruijn, Harold Boley, Dieter...
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
15 years 3 months ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi
ATAL
2008
Springer
14 years 12 months ago
Combining Cognitive with Computational Trust Reasoning
We propose a concept that combines the cognitive with the computational approaches to experience-based trust reasoning. We emphasize that a cognitive component is vital for computa...
Eugen Staab, Thomas Engel
ESANN
2006
14 years 11 months ago
Diversity creation in local search for the evolution of neural network ensembles
Abstract. The EENCL algorithm [1] automatically designs neural network ensembles for classification, combining global evolution with local search based on gradient descent. Two mec...
Pete Duell, Iris Fermin, Xin Yao