Sciweavers

1697 search results - page 187 / 340
» On Bayesian Case Matching
Sort
View
ISI
2006
Springer
15 years 23 days ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
JMLR
2006
153views more  JMLR 2006»
15 years 23 days ago
Collaborative Multiagent Reinforcement Learning by Payoff Propagation
In this article we describe a set of scalable techniques for learning the behavior of a group of agents in a collaborative multiagent setting. As a basis we use the framework of c...
Jelle R. Kok, Nikos A. Vlassis
107
Voted
CORR
2004
Springer
108views Education» more  CORR 2004»
15 years 19 days ago
Comparing Multi-Target Trackers on Different Force Unit Levels
Consider the problem of tracking a set of moving targets. Apart from the tracking result, it is often important to know where the tracking fails, either to steer sensors to that p...
Hedvig Sidenbladh, Pontus Svenson, Johan Schubert
97
Voted
JETAI
1998
110views more  JETAI 1998»
15 years 14 days ago
Independency relationships and learning algorithms for singly connected networks
Graphical structures such as Bayesian networks or Markov networks are very useful tools for representing irrelevance or independency relationships, and they may be used to e cientl...
Luis M. de Campos
92
Voted
PAMI
1998
100views more  PAMI 1998»
15 years 14 days ago
Hilbert-Schmidt Lower Bounds for Estimators on Matrix Lie Groups for ATR
—Deformable template representations of observed imagery, model the variability of target pose via the actions of the matrix Lie groups on rigid templates. In this paper, we stud...
Ulf Grenander, Michael I. Miller, Anuj Srivastava