Sciweavers

23703 search results - page 4429 / 4741
» Learning from Demonstration
Sort
View
JUCS
2008
156views more  JUCS 2008»
15 years 4 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
ECCC
2007
127views more  ECCC 2007»
15 years 4 months ago
Universal Semantic Communication I
Is it possible for two intelligent beings to communicate meaningfully, without any common language or background? This question has interest on its own, but is especially relevant...
Brendan Juba, Madhu Sudan
JMLR
2006
124views more  JMLR 2006»
15 years 4 months ago
Policy Gradient in Continuous Time
Policy search is a method for approximately solving an optimal control problem by performing a parametric optimization search in a given class of parameterized policies. In order ...
Rémi Munos
MTA
2008
186views more  MTA 2008»
15 years 4 months ago
Tactile web browsing for blind people
Information on the World Wide Web becomes more and more important for our society. For blind people this is a chance to access more information for their everyday life. In this pap...
Martin Rotard, Christiane Taras, Thomas Ertl
LRE
2006
175views more  LRE 2006»
15 years 4 months ago
Automatically generating related queries in Japanese
Web searchers reformulate their queries, as they adapt to search engine behavior, learn more about a topic, or simply correct typing errors. Automatic query rewriting can help user...
Rosie Jones, Kevin Bartz, Pero Subasic, Benjamin R...
« Prev « First page 4429 / 4741 Last » Next »