Sciweavers

2924 search results - page 498 / 585
» On the Use of Evidence in Neural Networks
Sort
View
PAM
2011
Springer
14 years 4 months ago
Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors
1 The arms race between copyright agencies and P2P users is an ongoing and evolving struggle. On the one hand, content providers are using several techniques to stealthily find un...
Rahul Potharaju, Jeff Seibert, Sonia Fahmy, Cristi...
132
Voted
NN
2006
Springer
232views Neural Networks» more  NN 2006»
15 years 1 months ago
A probabilistic model of gaze imitation and shared attention
An important component of language acquisition and cognitive learning is gaze imitation. Infants as young as one year of age can follow the gaze of an adult to determine the objec...
Matthew W. Hoffman, David B. Grimes, Aaron P. Shon...
IJCNN
2008
IEEE
15 years 8 months ago
Including multi-objective abilities in the Hybrid Intelligent Suite for decision support
— Hybrid intelligent systems (HIS) are very successful in tackling problems comprising of more than one distinct computational subtask. For instance, decision-making problems are...
Diogo Ferreira Pacheco, Flávio R. S. Olivei...
90
Voted
IWANN
2001
Springer
15 years 6 months ago
A New Approach to Evolutionary Computation: Segregative Genetic Algorithms (SEGA)
This paper looks upon the standard genetic algorithm as an artificial self-organizing process. With the purpose to provide concepts that make the algorithm more open for scalabili...
Michael Affenzeller
ICISC
2008
103views Cryptology» more  ICISC 2008»
15 years 3 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003