Sciweavers

1171 search results - page 76 / 235
» Multisource Algorithmic Information Theory
Sort
View
WPES
2003
ACM
15 years 3 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
SCALESPACE
2001
Springer
15 years 2 months ago
Bayesian Object Detection through Level Curves Selection
Bayesian statistical theory is a convenient way of taking a priori information into consideration when inference is made from images. In Bayesian image detection, the a priori dist...
Charles Kervrann
CORR
2008
Springer
113views Education» more  CORR 2008»
14 years 10 months ago
Gaussian Belief Propagation Solver for Systems of Linear Equations
The canonical problem of solving a system of linear equations arises in numerous contexts in information theory, communication theory, and related fields. In this contribution, we ...
Ori Shental, Paul H. Siegel, Jack K. Wolf, Danny B...
CORR
2004
Springer
91views Education» more  CORR 2004»
14 years 9 months ago
Distributed Control by Lagrangian Steepest Descent
Often adaptive, distributed control can be viewed as an iterated game between independent players. The coupling between the players' mixed strategies, arising as the system ev...
David Wolpert, Stefan Bieniawski
FOCM
2011
96views more  FOCM 2011»
14 years 1 months ago
Persistent Intersection Homology
The theory of intersection homology was developed to study the singularities of a topologically stratified space. This paper incorporates this theory into the already developed f...
Paul Bendich, John Harer