Sciweavers

4529 search results - page 866 / 906
» Position Based Cryptography
Sort
View
NIPS
2003
15 years 2 months ago
Boosting versus Covering
We investigate improvements of AdaBoost that can exploit the fact that the weak hypotheses are one-sided, i.e. either all its positive (or negative) predictions are correct. In pa...
Kohei Hatano, Manfred K. Warmuth
94
Voted
PICS
2003
15 years 2 months ago
Continuous Tone Alternatives To Halftone Through Historical Reflection
Halftone printing has been developing in a linear manner since the inception of photography. The process of refinement has taken it from one level to another producing increasingl...
Andrew Atkinson
119
Voted
ACL
2000
15 years 2 months ago
Automatic Labeling of Semantic Roles
e, the system labels constituents with either abstract semantic roles such as AGENT or PATIENT, or more domain-specific semantic roles such as SPEAKER, MESSAGE, and TOPIC. The syst...
Daniel Gildea, Daniel Jurafsky
115
Voted
NIPS
1998
15 years 2 months ago
Facial Memory Is Kernel Density Estimation (Almost)
We compare the ability of three exemplar-based memory models, each using three different face stimulus representations, to account for the probability a human subject responded &q...
Matthew N. Dailey, Garrison W. Cottrell, Thomas A....
ISMB
1997
15 years 2 months ago
Standardized Representations of the Literature: Combining Diverse Sources of Ribosomal Data
We are building a knowledge base (KB) of published structural data on the 30s ribosomal subunit in prokaryotes. Our KB is distinguished by a standardized representation of biologi...
Russ B. Altman, Neil F. Abernethy, Richard O. Chen