Sciweavers

3625 search results - page 34 / 725
» On choosing
Sort
View
AAAI
2007
15 years 2 months ago
Adaptive Traitor Tracing with Bayesian Networks
The practical success of broadcast encryption hinges on the ability to (1) revoke the access of compromised keys and (2) determine which keys have been compromised. In this work w...
Philip Zigoris, Hongxia Jin
AUSAI
2008
Springer
15 years 1 months ago
Using Gaussian Processes to Optimize Expensive Functions
The task of finding the optimum of some function f(x) is commonly accomplished by generating and testing sample solutions iteratively, choosing each new sample x heuristically on t...
Marcus R. Frean, Phillip Boyle
ALT
2010
Springer
15 years 1 months ago
Consistency of Feature Markov Processes
We are studying long term sequence prediction (forecasting). We approach this by investigating criteria for choosing a compact useful state representation. The state is supposed t...
Peter Sunehag, Marcus Hutter
BIS
2008
103views Business» more  BIS 2008»
15 years 1 months ago
Managing conflicts between users in Wikipedia
Wikipedia is nowadays a widely used encyclopedia, and one of the most visible sites on the Internet. Its strong principle of collaborative work and free editing sometimes generate...
Bernard Jacquemin, Aurélien Lauf, Cé...
ICWSM
2008
15 years 1 months ago
Thin Slices of Online Profile Attributes
People form consistent impressions of others given surprisingly little information. With the advent of social networks, impressions now may form online rather than in a face-to-fa...
Kristin Brooke Stecher, Scott Counts