Sciweavers

13026 search results - page 2460 / 2606
» Probabilistic Relational Models
Sort
View
141
Voted
CSREASAM
2003
15 years 5 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
159
Voted
IJCAI
2001
15 years 5 months ago
Executing Reactive, Model-based Programs through Graph-based Temporal Planning
In the future, webs of unmanned air and space vehicles will act together to robustly perform elaborate missions in uncertain environments. We coordinate these systems by introduci...
Phil Kim, Brian C. Williams, Mark Abramson
161
Voted
EFDBS
2003
15 years 5 months ago
Four-Level-Architecture for Closure in Interoperability
A definition of types in an information system is given from ld abstractions through data constructs, schema and definitions to physical data values. Category theory suggests tha...
B. Nick Rossiter, Michael A. Heather
132
Voted
SIMVIS
2004
15 years 5 months ago
Model-based Approach to Automatic 3D Seismic Horizon Correlation across Faults
Seismic data provide detailed information about subsurface structures. Reflection events visible in the seismic data are known as horizons, and indicate boundaries between differe...
Fitsum Admasu, Klaus D. Tönnies
147
Voted
IJCAI
2003
15 years 5 months ago
Integrating Background Knowledge Into Text Classification
We present a description of three different algorithms that use background knowledge to improve text classifiers. One uses the background knowledge as an index into the set of tra...
Sarah Zelikovitz, Haym Hirsh
« Prev « First page 2460 / 2606 Last » Next »