Sciweavers

6042 search results - page 1093 / 1209
» Repeated Observation Models
Sort
View
144
Voted
ASIACRYPT
2008
Springer
15 years 6 months ago
MPC vs. SFE : Unconditional and Computational Security
Abstract. In secure computation among a set P of players one considers an adversary who can corrupt certain players. The three usually considered types of corruption are active, pa...
Martin Hirt, Ueli M. Maurer, Vassilis Zikas
149
Voted
AAAI
2010
15 years 6 months ago
Multi-Agent Plan Recognition: Formalization and Algorithms
Multi-Agent Plan Recognition (MAPR) seeks to identify the dynamic team structures and team behaviors from the observations of the activity-sequences of a set of intelligent agents...
Bikramjit Banerjee, Landon Kraemer, Jeremy Lyle
LREC
2010
155views Education» more  LREC 2010»
15 years 6 months ago
WTIMIT: The TIMIT Speech Corpus Transmitted Over The 3G AMR Wideband Mobile Network
Due to upcoming mobile telephony services with higher speech quality, a wideband (50 Hz to 7 kHz) mobile telephony derivative of TIMIT has been recorded called WTIMIT. It allows a...
Patrick Bauer, David Scheler, Tim Fingscheidt
144
Voted
ESANN
2007
15 years 6 months ago
Causality analysis of LFPs in micro-electrode arrays based on mutual information
Since perceptual and motor processes in the brain are the result of interactions between neurons, layers and areas, a lot of attention has been directed towards the development of...
Nikolay V. Manyakov, Marc M. Van Hulle
ESANN
2007
15 years 6 months ago
How to process uncertainty in machine learning?
Uncertainty is a popular phenomenon in machine learning and a variety of methods to model uncertainty at different levels has been developed. The aim of this paper is to motivate ...
Barbara Hammer, Thomas Villmann
« Prev « First page 1093 / 1209 Last » Next »