.2 Network

Results: 9390



#Item
771Machine learning / Artificial neural networks / Artificial intelligence / Learning / Applied mathematics / Computational neuroscience / Cybernetics / Computational statistics / Autoencoder / Speech recognition / Backpropagation / Supervised learning

UNSUPERVISED NEURAL NETWORK BASED FEATURE EXTRACTION USING WEAK TOP-DOWN CONSTRAINTS Herman Kamper1,2 , Micha Elsner3 , Aren Jansen4 , Sharon Goldwater2 1 CSTR and 2 ILCC, School of Informatics, University of Edinburgh,

Add to Reading List

Source URL: www.cstr.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
772Computing / Transmission Control Protocol / Bayesian network / Routing / Tree

A Stochastic Model for Reputation Management in Introduction-Based Trust Systems1,2 O. Patrick Kreidl University of North Florida Jacksonville, Florida, U.S.A.

Add to Reading List

Source URL: stoch-nets-2012.lids.mit.edu

Language: English - Date: 2012-06-11 04:38:41
773Artificial intelligence / Machine learning / Fellows of the American Association for the Advancement of Science / Richard S. Sutton / Andrew Barto / Applied mathematics / Reinforcement learning / Artificial neural network / Dalle Molle Institute for Artificial Intelligence Research / Thomas G. Dietterich / Russell Greiner

CURRICULUM VITAE Richard S. Sutton April 2015 Professor, Department of Computing Science, University of Alberta address: Athabasca Hall 2-21, University of Alberta, Edmonton, AB T6G 2E8

Add to Reading List

Source URL: incompleteideas.net

Language: English - Date: 2015-04-07 14:18:17
774Computational linguistics / Markov models / Automatic identification and data capture / Computer accessibility / Speech recognition / Speech synthesis / Hidden Markov model / KullbackLeibler divergence

Deep neural network context embeddings for model selection in rich-context HMM synthesis Thomas Merritt1 , Junichi Yamagishi1,2 , Zhizheng Wu1 , Oliver Watts1 , Simon King1 1 The Centre for Speech Technology Research, U

Add to Reading List

Source URL: www.cstr.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
775Cryptocurrencies / Bitcoin / Alternative currencies / Computing / E-commerce / Currency / Bitcoin network / Hashing / B-tree / Blockchain / Cryptographic hash function / Draft:Viccoin:APeer-to-PeerDigital Currency System

Secure High-Rate Transaction Processing in Bitcoin Yonatan Sompolinsky1 and Aviv Zohar1,2 1 School of Engineering and Computer Science,

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:33:39
776Artificial neural networks / Evolutionary algorithms / Evolutionary computation / Genetic algorithms / Artificial intelligence / HyperNEAT / Neuroevolution of augmenting topologies / Neuroevolution / Compositional pattern-producing network / Robotics / Robot / Cognitive robotics

Multirobot Behavior Synchronization through Direct Neural Network Communication In: Proceedings of the 5th International Conference on Intelligent Robotics and Applications (ICIRANew York, NY: Springer-Verlang, 2

Add to Reading List

Source URL: eplex.cs.ucf.edu

Language: English - Date: 2012-07-05 13:15:47
777

A Neural Network Model for Low-Resource Universal Dependency Parsing Long Duong,12 Trevor Cohn,1 Steven Bird,1 and Paul Cook3 1 Department of Computing and Information Systems, University of Melbourne 2

Add to Reading List

Source URL: aclweb.org

Language: English - Date: 2015-09-09 11:04:18
    778

    [4-2] CSSDC PROMOTED SERVICE ALSO STRENGTHENED CONNECTION TO SOLAR-TERRESTRIAL COMMUNITY THROUGH DEEP PROJECTS COOPERATION Zou Ziming, Xiong Senlin, Ji zhen Laboratory of Space Science Data and Network Technology, Nation

    Add to Reading List

    Source URL: isds.nict.go.jp

    Language: English - Date: 2015-10-15 04:29:22
      779

      BIEN BASIC INCOME EARTH NETWORK NEWSFLASH 65, November 2011 www.basicincome.org The Basic Income Earth Network was founded in 1986 as the Basic Income European Network. It expanded its scope from Europe to the Earth in 2

      Add to Reading List

      Source URL: www.basicincome.org

      Language: English - Date: 2015-02-11 06:29:55
        780Internet privacy / Content-control software / Internet security / Internet censorship / Computer network security / Telex / Censorship / Tor / Steganography / Roman censor / Deep packet inspection / Flash proxy

        Censorship Arms Race: Research vs. Practice Sadia Afroz1 , David Fifield1 , Michael C. Tschantz2 , Vern Paxson1,2 , J. D. Tygar1 1 2

        Add to Reading List

        Source URL: www.icir.org

        Language: English - Date: 2015-07-07 21:36:37
        UPDATE