Sciweavers

4142 search results - page 802 / 829
» Trusting an Information Agent
Sort
View
WWW
2010
ACM
15 years 1 hour ago
Implementing the media fragments URI specification
In this paper, we describe two examples of implementations of the Media Fragments URI specification which is currently being developed by the W3C Media Fragments Working Group. Th...
Davy Van Deursen, Raphaël Troncy, Erik Mannen...
AI
2007
Springer
14 years 12 months ago
Head gestures for perceptual interfaces: The role of context in improving recognition
Head pose and gesture offer several conversational grounding cues and are used extensively in face-to-face interaction among people. To recognize visual feedback efficiently, hum...
Louis-Philippe Morency, Candace L. Sidner, Christo...
CORR
2010
Springer
156views Education» more  CORR 2010»
14 years 12 months ago
Selling Privacy at Auction
We initiate the study of markets for private data, through the lens of differential privacy. Although the purchase and sale of private data has already begun on a large scale, a t...
Arpita Ghosh, Aaron Roth
CSDA
2008
147views more  CSDA 2008»
14 years 12 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
IJRR
2008
186views more  IJRR 2008»
14 years 11 months ago
Automated Design of Adaptive Controllers for Modular Robots using Reinforcement Learning
Designing distributed controllers for self-reconfiguring modular robots has been consistently challenging. We have developed a reinforcement learning approach which can be used bo...
Paulina Varshavskaya, Leslie Pack Kaelbling, Danie...