Sciweavers

9842 search results - page 1837 / 1969
» The Complexity of the Matching-Cut Problem
Sort
View
155
Voted
FOCS
2003
IEEE
15 years 10 months ago
Bounded-Concurrent Secure Two-Party Computation in a Constant Number of Rounds
We consider the problem of constructing a general protocol for secure two-party computation in a way that preserves security under concurrent composition. In our treatment, we foc...
Rafael Pass, Alon Rosen
HICSS
2003
IEEE
123views Biometrics» more  HICSS 2003»
15 years 10 months ago
Issues in Rational Planning in Multi-Agent Settings
We adopt the decision-theoretic principle of expected utility maximization as a paradigm for designing autonomous rational agents operating in multi-agent environments. We use the...
Piotr J. Gmytrasiewicz
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
15 years 10 months ago
Automatic Mediation between Incompatible Component Interaction Styles
Incompatibility of component interaction styles is identified as a major obstacle to interoperability when using off-the-shelf components or dealing with legacy software in compos...
Klaus-Peter Löhr
ICDAR
2003
IEEE
15 years 10 months ago
Best Practices for Convolutional Neural Networks Applied to Visual Document Analysis
Neural networks are a powerful technology for classification of visual inputs arising from documents. However, there is a confusing plethora of different neural network methods th...
Patrice Simard, David Steinkraus, John C. Platt
ICDM
2003
IEEE
104views Data Mining» more  ICDM 2003»
15 years 10 months ago
Localized Prediction of Continuous Target Variables Using Hierarchical Clustering
In this paper, we propose a novel technique for the efficient prediction of multiple continuous target variables from high-dimensional and heterogeneous data sets using a hierarch...
Aleksandar Lazarevic, Ramdev Kanapady, Chandrika K...
« Prev « First page 1837 / 1969 Last » Next »