Sciweavers

117 search results - page 16 / 24
» Why Cryptosystems Fail
Sort
View
IJCAI
1989
15 years 27 days ago
Coping With Uncertainty in Map Learning
In many applications in mobile robotics, it is important for a robot to explore its environment in order to construct a representation of space useful for guiding movement. We refe...
Kenneth Basye, Thomas Dean, Jeffrey Scott Vitter
IJIM
2008
60views more  IJIM 2008»
14 years 11 months ago
The Role of Podcasts in Students' Learning
Podcasts have been employed extensively in some countries and are now being trialed at a number of universities in Australia. They allow ubiquitous learning whereby students can ac...
Laurel Evelyn Dyson
IJCV
2000
133views more  IJCV 2000»
14 years 11 months ago
Heteroscedastic Regression in Computer Vision: Problems with Bilinear Constraint
We present an algorithm to estimate the parameters of a linear model in the presence of heteroscedastic noise, i.e., each data point having a different covariance matrix. The algor...
Yoram Leedan, Peter Meer
JECR
2000
136views more  JECR 2000»
14 years 11 months ago
Modeling the Supply-Demand Interaction in Electronic Commerce: A Bi-Level Programming Approach
The purpose of this paper consists in establishing the model for the supply-demand interaction in the age of electronic commerce. First of all, the study uses the individual objec...
Daniel Y. Shee, Tzung-I Tang, Gwo-Hshiung Tzeng
SYNTHESE
2008
81views more  SYNTHESE 2008»
14 years 11 months ago
The inclosure scheme and the solution to the paradoxes of self-reference
All paradoxes of self-reference seem to share some structural features. Russell in 1908 and especially Priest nowadays have advanced structural descriptions that successfully ident...
Jordi Valor Abad