Sciweavers

652 search results - page 87 / 131
» expert 2007
Sort
View
ICISC
1998
132views Cryptology» more  ICISC 1998»
15 years 9 days ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
NIPS
1998
15 years 9 days ago
SMEM Algorithm for Mixture Models
When learning a mixture model, we suffer from the local optima and model structure determination problems. In this paper, we present a method for simultaneously solving these prob...
Naonori Ueda, Ryohei Nakano, Zoubin Ghahramani, Ge...
IJCAI
1997
15 years 9 days ago
Aggregating Features and Matching Cases on Vague Linguistic Expressions
Decision making based on the comparison of multiple criteria of two or more alternatives, is the subject of intensive research. In many decision making situations, a single criter...
Alfons Schuster, Werner Dubitzky, Philippe Lopes, ...
NIPS
1997
15 years 9 days ago
Learning Human-like Knowledge by Singular Value Decomposition: A Progress Report
Singular value decomposition (SVD) can be viewed as a method for unsupervised training of a network that associates two classes of events reciprocally by linear connections throug...
Thomas K. Landauer, Darrell Laham, Peter W. Foltz
BILDMED
2009
173views Algorithms» more  BILDMED 2009»
15 years 2 days ago
Interactive Boundary Detection for Automatic Definition of 2D Opacity Transfer Function
In computer assisted diagnostics nowadays, high-value 3-D visualization intake a supporting role to the traditional 2-D slice wise visualization. 3-D visualization may create intui...
Martin Rauberger, Heinrich M. Overhoff