Sciweavers

5344 search results - page 861 / 1069
» Privacy-Preserving Set Operations
Sort
View
IEEEVAST
2010
14 years 10 months ago
Flow-based scatterplots for sensitivity analysis
Visualization of multi-dimensional data is challenging due to the number of complex correlations that may be present in the data but that are difficult to be visually identified. ...
Yu-Hsuan Chan, Carlos D. Correa, Kwan-Liu Ma
INTERSPEECH
2010
14 years 10 months ago
Continuous speech recognition with a TF-IDF acoustic model
Information retrieval methods are frequently used for indexing and retrieving spoken documents, and more recently have been proposed for voice-search amongst a pre-defined set of ...
Geoffrey Zweig, Patrick Nguyen, Jasha Droppo, Alex...
JAR
2010
95views more  JAR 2010»
14 years 10 months ago
Equivariant Unification
Nominal logic is a variant of first-order logic with special facilities for reasoning about names and binding based on the underlying concepts of swapping and freshness. It serves ...
James Cheney
JC
2010
117views more  JC 2010»
14 years 10 months ago
Tractability through increasing smoothness
We prove that some multivariate linear tensor product problems are tractable in the worst case setting if they are defined as tensor products of univariate problems with logarithm...
Anargyros Papageorgiou, Henryk Wozniakowski
157
Voted
JMLR
2010
119views more  JMLR 2010»
14 years 10 months ago
A Convergent Online Single Time Scale Actor Critic Algorithm
Actor-Critic based approaches were among the first to address reinforcement learning in a general setting. Recently, these algorithms have gained renewed interest due to their gen...
Dotan Di Castro, Ron Meir