Sciweavers

506 search results - page 60 / 102
» Where Is the Value in a Program Verifier
Sort
View
UAI
2004
15 years 1 months ago
Sequential Information Elicitation in Multi-Agent Systems
We introduce the study of sequential information elicitation in strategic multi-agent systems. In an information elicitation setup a center attempts to compute the value of a func...
Rann Smorodinsky, Moshe Tennenholtz
97
Voted
RA
2003
130views Robotics» more  RA 2003»
15 years 1 months ago
A Parallel Solution Scheme of Inverse Dynamics for Flexible Manipulators
In this paper, we describe a parallel solution scheme of inverse dynamics, and its application to flexible manipulators where elastic deformation and vibration normally occur in c...
Daigoro Isobe, Daisaku Imaizumi
JMLR
2008
188views more  JMLR 2008»
15 years 1 days ago
Maximal Causes for Non-linear Component Extraction
We study a generative model in which hidden causes combine competitively to produce observations. Multiple active causes combine to determine the value of an observed variable thr...
Jörg Lücke, Maneesh Sahani
JMS
2010
65views more  JMS 2010»
14 years 11 months ago
A Tree-Based Decision Model to Support Prediction of the Severity of Asthma Exacerbations in Children
This paper describes the development of a tree-based decision model to predict the severity of pediatric asthma exacerbations in the emergency department (ED) at two hours followi...
Ken Farion, Wojtek Michalowski, Szymon Wilk, Dympn...
INFOCOM
2010
IEEE
14 years 10 months ago
SafeQ: Secure and Efficient Query Processing in Sensor Networks
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widel...
Fei Chen, Alex X. Liu