• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 14,032
Next 10 →

Estimation of probabilities from sparse data for the language model component of a speech recognizer

by Slava M. Katz - IEEE Transactions on Acoustics, Speech and Signal Processing , 1987
"... Abstract-The description of a novel type of rn-gram language model is given. The model offers, via a nonlinear recursive procedure, a com-putation and space efficient solution to the problem of estimating prob-abilities from sparse data. This solution compares favorably to other proposed methods. Wh ..."
Abstract - Cited by 799 (2 self) - Add to MetaCart
Abstract-The description of a novel type of rn-gram language model is given. The model offers, via a nonlinear recursive procedure, a com-putation and space efficient solution to the problem of estimating prob-abilities from sparse data. This solution compares favorably to other proposed methods

The dynamic behavior of a data dissemination protocol for network programming at scale

by Jonathan W. Hui, David Culler - In Proceedings of the Second International Conferences on Embedded Network Sensor Systems (SenSys
"... To support network programming, we present Deluge, a reliable data dissemination protocol for propagating large data objects from one or more source nodes to many other nodes over a multihop, wireless sensor network. Deluge builds from prior work in density-aware, epidemic maintenance protocols. Usi ..."
Abstract - Cited by 492 (24 self) - Add to MetaCart
messages are limited to 18 % of all transmissions. At scale, the protocol exposes interesting propagation dynamics only hinted at by previous dissemination work. A simple model is also derived which describes the limits of data propagation in wireless networks. Finally, we argue that the rates obtained

Pyramid-Based Texture Analysis/Synthesis

by David J. Heeger, James R. Bergen , 1995
"... This paper describes a method for synthesizing images that match the texture appearanceof a given digitized sample. This synthesis is completely automatic and requires only the "target" texture as input. It allows generation of as much texture as desired so that any object can be covered. ..."
Abstract - Cited by 480 (0 self) - Add to MetaCart
. It can be used to produce solid textures for creating textured 3-d objects without the distortions inherent in texture mapping. It can also be used to synthesize texture mixtures, images that look a bit like each of several digitized samples. The approach is based on a model of human texture perception

Real-Time Computing Without Stable States: A New Framework for Neural Computation Based on Perturbations

by Wolfgang Maass, Thomas Natschläger, Henry Markram
"... A key challenge for neural modeling is to explain how a continuous stream of multi-modal input from a rapidly changing environment can be processed by stereotypical recurrent circuits of integrate-and-fire neurons in real-time. We propose a new computational model for real-time computing on time-var ..."
Abstract - Cited by 469 (38 self) - Add to MetaCart
A key challenge for neural modeling is to explain how a continuous stream of multi-modal input from a rapidly changing environment can be processed by stereotypical recurrent circuits of integrate-and-fire neurons in real-time. We propose a new computational model for real-time computing on time

A general framework for object detection

by Constantine P. Papageorgiou, Michael Oren, Tomaso Poggio - Sixth International Conference on , 1998
"... This paper presents a general trainable framework for object detection in static images of cluttered scenes. The detection technique we develop is based on a wavelet representation of an object class derived from a statistical analysis of the class instances. By learning an object class in terms of ..."
Abstract - Cited by 395 (21 self) - Add to MetaCart
in unconstrained environments. We demonstrate the capabilities of the technique in two domains whose inherent information content differs significantly. The first system is face detection and the second is the domain of people which, in contrast to faces, vary greatly in color, texture, and patterns. Unlike

An efficient algorithm for exploiting multiple arithmetic units

by R. M. Tomasulo - IBM JOURNAL OF RESEARCH AND DEVELOPMENT , 1967
"... This paper describes the methods employed in the floating-point area of the System/360 Model 91 to exploit the existence of multiple execution units. Basic to these techniques is a simple common data busing and register tagging scheme which permits simultaneous execution of independent instructions ..."
Abstract - Cited by 391 (1 self) - Add to MetaCart
This paper describes the methods employed in the floating-point area of the System/360 Model 91 to exploit the existence of multiple execution units. Basic to these techniques is a simple common data busing and register tagging scheme which permits simultaneous execution of independent instructions

Fuzzy identity-based encryption

by Amit Sahai, Brent Waters - In EUROCRYPT , 2005
"... We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A Fuzzy IBE scheme allows for a private key for an identity, ω, to decrypt a ciphertext encrypted with an identity, ω ′ , ..."
Abstract - Cited by 377 (20 self) - Add to MetaCart
identities, which inherently will have some noise each time they are sampled. Additionally, we show that Fuzzy-IBE can be used for a type of application that we term “attribute-based encryption”. In this paper we present two constructions of Fuzzy IBE schemes. Our constructions can be viewed as an Identity

The danger model: A renewed sense of self

by Polly Matzinger - Science , 2002
"... For over 50 years immunologists have based their thoughts, experiments, and clinical treatments on the idea that the immune system functions by making a distinction between self and nonself. Although this paradigm has often served us well, years of detailed examination have revealed a number of inhe ..."
Abstract - Cited by 325 (0 self) - Add to MetaCart
of inherent problems. This Viewpoint outlines a model of immunity based on the idea that the immune system is more concerned with entities that do damage than with those that are foreign. First, do no harm. –Hippocratic oath Of all the mysteries in modern science, the mechanisms of self versus nonself

Stable models and an alternative logic programming paradigm

by Victor W. Marek - In The Logic Programming Paradigm: a 25-Year Perspective , 1999
"... In this paper we reexamine the place and role of stable model semantics in logic programming and contrast it with a least Herbrand model approach to Horn programs. We demonstrate that inherent features of stable model semantics naturally lead to a logic programming system that offers an interesting ..."
Abstract - Cited by 310 (19 self) - Add to MetaCart
In this paper we reexamine the place and role of stable model semantics in logic programming and contrast it with a least Herbrand model approach to Horn programs. We demonstrate that inherent features of stable model semantics naturally lead to a logic programming system that offers an interesting

NBER WORKING PAPER SERIES ASSESSING INHERENT MODEL BIAS: AN APPLICATION TO NATIVE DISPLACEMENT IN RESPONSE TO IMMIGRATION

by Giovanni Peri, Chad Sparber, Giovanni Peri, Chad Sparber, Giovanni Peri, Chad Sparber , 2010
"... The views expressed herein are those of the authors and do not necessarily reflect the views of the National Bureau of Economic Research. NBER working papers are circulated for discussion and comment purposes. They have not been peer-reviewed or been subject to the review by the NBER Board of Direct ..."
Abstract - Add to MetaCart
The views expressed herein are those of the authors and do not necessarily reflect the views of the National Bureau of Economic Research. NBER working papers are circulated for discussion and comment purposes. They have not been peer-reviewed or been subject to the review by the NBER Board of Directors that accompanies official NBER publications.
Next 10 →
Results 1 - 10 of 14,032
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University