Sciweavers

8970 search results - page 1579 / 1794
» Learning to Learn Causal Models
Sort
View
CRYPTO
2009
Springer
122views Cryptology» more  CRYPTO 2009»
15 years 8 months ago
Utility Dependence in Correct and Fair Rational Secret Sharing
The problem of carrying out cryptographic computations when the participating parties are rational in a game-theoretic sense has recently gained much attention. One problem that h...
Gilad Asharov, Yehuda Lindell
130
Voted
MM
2009
ACM
252views Multimedia» more  MM 2009»
15 years 8 months ago
Localizing volumetric motion for action recognition in realistic videos
This paper presents a novel motion localization approach for recognizing actions and events in real videos. Examples include StandUp and Kiss in Hollywood movies. The challenge ca...
Xiao Wu, Chong-Wah Ngo, Jintao Li, Yongdong Zhang
ICTAI
2008
IEEE
15 years 8 months ago
Information Extraction as an Ontology Population Task and Its Application to Genic Interactions
Ontologies are a well-motivated formal representation to model knowledge needed to extract and encode data from text. Yet, their tight integration with Information Extraction (IE)...
Alain-Pierre Manine, Érick Alphonse, Philip...
SECON
2008
IEEE
15 years 8 months ago
Optimal Buffer Management Policies for Delay Tolerant Networks
—Delay Tolerant Networks are wireless networks where disconnections may occur frequently due to propagation phenomena, node mobility, and power outages. Propagation delays may al...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...
149
Voted
AIIA
2007
Springer
15 years 8 months ago
A Hierarchical Clustering Procedure for Semantically Annotated Resources
Abstract. A clustering method is presented which can be applied to relational knowledge bases. It can be used to discover interesting groupings of resources through their (semantic...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito
« Prev « First page 1579 / 1794 Last » Next »