Search
Now showing items 3751-3760 of 4210
A Bayesian inference theory of attention: neuroscience and algorithms
(2009-10-03)
The past four decades of research in visual neuroscience has generated a large and disparate body of literature on the role of attention [Itti et al., 2005]. Although several models have been developed to describe specific ...
Whanaungatanga: Sybil-proof routing with social networks
(2009-09-24)
Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed ...
Efficient POMDP Forward Search by Predicting the Posterior Belief Distribution
(2009-09-23)
Online, forward-search techniques have demonstrated promising results for solving problems in partially observable environments. These techniques depend on the ability to efficiently search and evaluate the set of beliefs ...
Iterative Projection Methods for Structured Sparsity Regularization
(2009-10-14)
In this paper we propose a general framework to characterize and solve the optimization problems underlying a large class of sparsity based regularization algorithms. More precisely, we study the minimization of learning ...
Code for LOLCAT Method (Variant of Gillespie Algorithm)
(2009-09-04)
This code and data is publicly listed code for the LOLCAT Method developed by Sagar Indurkhya and Jacob Beal, in the paper: "Reaction factoring and bipartite update graphs accelerate the Gillespie algorithm for large-scale ...
Attentive processing improves object recognition
(2009-10-02)
The human visual system can recognize several thousand object categories irrespective of their position and size. This combination of selectivity and invariance is built up gradually across several stages of visual processing. ...
Notes on the Shannon Entropy of the Neural Response
(2009-10-09)
In these notes we focus on the concept of Shannon entropy in an attempt to provide a systematic way of assessing the discrimination properties of the neural response, and quantifying the role played by the number of layers ...
Finding aircraft collision-avoidance strategies using policy search methods
(2009-09-12)
A progress report describing the application of policy gradient and policy search by dynamic programming methods to an aircraft collision avoidance problem inspired by the requirements of next-generation TCAS.
Automatic Error Finding in Access-Control Policies
(2010-05-05)
Access-control policies are a key infrastructural technology for computer security. However, a significant problem is that system administrators need to be able to automatically verify whether their policies capture the ...
Kongming: A Generative Planner for Hybrid Systems with Temporally Extended Goals
(2010-04-09)
Most unmanned missions in space and undersea are commanded by a "script" that specifies a sequence of discrete commands and continuous actions. Currently such scripts are mostly hand-generated by human operators. This ...