Sciweavers

7200 search results - page 1169 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
100
Voted
GECCO
2004
Springer
15 years 6 months ago
Evolving a Roving Eye for Go
Go remains a challenge for artificial intelligence. Currently, most machine learning methods tackle Go by playing on a specific fixed board size, usually smaller than the standa...
Kenneth O. Stanley, Risto Miikkulainen
ICAISC
2004
Springer
15 years 6 months ago
Relevance LVQ versus SVM
Abstract. The support vector machine (SVM) constitutes one of the most successful current learning algorithms with excellent classification accuracy in large real-life problems an...
Barbara Hammer, Marc Strickert, Thomas Villmann
105
Voted
ICICS
2004
Springer
15 years 6 months ago
Factorization-Based Fail-Stop Signatures Revisited
Fail-stop signature (FSS) schemes are important primitives because in a fail-stop signature scheme the signer is protected against unlimited powerful adversaries as follows: Even i...
Katja Schmidt-Samoa
112
Voted
ISMIR
2004
Springer
145views Music» more  ISMIR 2004»
15 years 6 months ago
Audio Fingerprinting In Peer-to-peer Networks
Despite the immense potential of Peer-to-Peer (P2P) networks in facilitating collaborative applications, they have become largely known as a free haven for pirated music swapping....
Prarthana Shrestha, Ton Kalker
137
Voted
ITRUST
2004
Springer
15 years 6 months ago
Towards Dynamic Security Perimeters for Virtual Collaborative Networks
Abstract The Internet provides a ubiquitous, standards-based substrate for global communications of all kinds. Rapid advances are now being made in agreeing protocols and machine-p...
Ivan Djordjevic, Theodosis Dimitrakos
« Prev « First page 1169 / 1440 Last » Next »