Sciweavers

8381 search results - page 1569 / 1677
» The security of machine learning
Sort
View
102
Voted
IFIP12
2009
14 years 10 months ago
Defining a Task's Temporal Domain for Intelligent Calendar Applications
Abstract Intelligent calendar assistants have many years ago attracted researchers from the areas of scheduling, machine learning and human computer interaction. However, all effor...
Anastasios Alexiadis, Ioannis Refanidis
120
Voted
COMCOM
2010
148views more  COMCOM 2010»
14 years 10 months ago
Privacy versus scalability in radio frequency identification systems
Embedding a Radio Frequency Identification (RFID) tag into individual items enables the unique identification of such items over the wireless medium, without the need for a line-o...
Basel Alomair, Radha Poovendran
97
Voted
COMCOM
2010
118views more  COMCOM 2010»
14 years 10 months ago
Mini-slot scheduling for IEEE 802.16d chain and grid mesh networks
This work considers the mini-slot scheduling problem in IEEE 802.16d wireless mesh networks (WMNs). An efficient mini-slot scheduling needs to take into account the transmission o...
Jia-Ming Liang, Ho-Cheng Wu, Jen-Jee Chen, Yu-Chee...
119
Voted
CORR
2010
Springer
237views Education» more  CORR 2010»
14 years 10 months ago
Featureless 2D-3D Pose Estimation by Minimising an Illumination-Invariant Loss
The problem of identifying the 3D pose of a known object from a given 2D image has important applications in Computer Vision ranging from robotic vision to image analysis. Our pro...
Srimal Jayawardena, Marcus Hutter, Nathan Brewer
99
Voted
CORR
2010
Springer
136views Education» more  CORR 2010»
14 years 10 months ago
An Inverse Power Method for Nonlinear Eigenproblems with Applications in 1-Spectral Clustering and Sparse PCA
Many problems in machine learning and statistics can be formulated as (generalized) eigenproblems. In terms of the associated optimization problem, computing linear eigenvectors a...
Matthias Hein, Thomas Bühler
« Prev « First page 1569 / 1677 Last » Next »