Sciweavers

303 search results - page 41 / 61
» Unifying Theories of Confidentiality
Sort
View
DAC
2005
ACM
16 years 22 days ago
A lattice-based framework for the classification and design of asynchronous pipelines
This paper presents a unifying framework for the modeling of asynchronous pipeline circuits. A pipeline protocol is captured in a graph-based model which defines the partial order...
Peggy B. McGee, Steven M. Nowick
MICCAI
2004
Springer
16 years 19 days ago
Real-Time Multi-model Tracking of Myocardium in Echocardiography Using Robust Information Fusion
Automatic myocardial wall motion tracking in ultrasound images is an important step in analysis of the heart function. Existing methods for Myocardial Wall Tracking are not robust ...
Bogdan Georgescu, Xiang Sean Zhou, Dorin Comaniciu...
ICML
2005
IEEE
16 years 17 days ago
Proto-value functions: developmental reinforcement learning
This paper presents a novel framework called proto-reinforcement learning (PRL), based on a mathematical model of a proto-value function: these are task-independent basis function...
Sridhar Mahadevan
WWW
2007
ACM
16 years 13 days ago
Integrating web directories by learning their structures
Documents in the Web are often organized using category trees by information providers (e.g. CNN, BBC) or search engines (e.g. Google, Yahoo!). Such category trees are commonly kn...
Christopher C. Yang, Jianfeng Lin
PODS
2009
ACM
134views Database» more  PODS 2009»
16 years 9 days ago
Equivalence of nested queries with mixed semantics
We consider the problem of deciding query equivalence for a conjunctive language in which queries output complex objects composed from a mixture of nested, unordered collection ty...
David DeHaan