Sciweavers

1888 search results - page 275 / 378
» Information Distance
Sort
View
IBERAMIA
2010
Springer
15 years 3 months ago
Detection of Multiple People by a Mobile Robot in Dynamic Indoor Environments
Detection of multiple people is a key element for social robot design and it is a requirement for effective human-robot interaction. However, it is not an easy task, especially in...
José Alberto Méndez-Polanco, Ang&eac...
ESORICS
2003
Springer
15 years 10 months ago
Rapid Mixing and Security of Chaum's Visual Electronic Voting
Recently, David Chaum proposed an electronic voting scheme that combines visual cryptography and digital processing. It was designed to meet not only mathematical security standard...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
NIPS
1997
15 years 6 months ago
Computing with Action Potentials
Most computational engineering based loosely on biology uses continuous variables to represent neural activity. Yet most neurons communicate with action potentials. The engineerin...
John J. Hopfield, Carlos D. Brody, Sam T. Roweis
FC
2007
Springer
122views Cryptology» more  FC 2007»
15 years 10 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
DMKD
2004
ACM
139views Data Mining» more  DMKD 2004»
15 years 10 months ago
Iterative record linkage for cleaning and integration
Record linkage, the problem of determining when two records refer to the same entity, has applications for both data cleaning (deduplication) and for integrating data from multipl...
Indrajit Bhattacharya, Lise Getoor