Sciweavers

157 search results - page 16 / 32
» Passing Messages to Lonely Numbers
Sort
View
POLICY
2009
Springer
15 years 4 months ago
Abductive Authorization Credential Gathering
A central task in the context of logic-based decentralized authorization languages is that of gathering credentials from credential providers, required by the resource guard’s p...
Moritz Y. Becker, Jason F. Mackay, Blair Dillaway
KI
2007
Springer
15 years 4 months ago
Location-Based Activity Recognition
Learning patterns of human behavior from sensor data is extremely important for high-level activity inference. We show how to extract and label a person’s activities and signi...
Dieter Fox
ISPDC
2006
IEEE
15 years 4 months ago
Mobile Parallel Computing
: The Mobile Message Passing Interface is a library which implements MPI functionality on Bluetooth enabled mobile phones. It provides many of the functions available in MPI, inclu...
Daniel C. Doolan, Sabin Tabirca, Laurence Tianruo ...
ICPR
2010
IEEE
15 years 3 months ago
Constrained Energy Minimization for Matching-Based Image Recognition
We propose to use energy minimization in MRFs for matching-based image recognition tasks. To this end, the Tree-Reweighted Message Passing algorithm is modified by geometric cons...
Tobias Gass, Philippe Dreuw, Hermann Ney
SIGECOM
2004
ACM
134views ECommerce» more  SIGECOM 2004»
15 years 3 months ago
Computing approximate bayes-nash equilibria in tree-games of incomplete information
We provide efficient algorithms for finding approximate BayesNash equilibria (BNE) in graphical, specifically tree, games of incomplete information. In such games an agent’s p...
Satinder P. Singh, Vishal Soni, Michael P. Wellman