You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume is dedicated to the 15th Symposium on Fundamentals of Computation Theory FCT 2005, held in Lubeck, Germany, on August 17–20, 2005.
This volume contains the papers presented at the 13th Annual Conference on Algorithmic Learning Theory (ALT 2002), which was held in Lub ̈ eck (Germany) during November 24–26, 2002. The main objective of the conference was to p- vide an interdisciplinary forum discussing the theoretical foundations of machine learning as well as their relevance to practical applications. The conference was colocated with the Fifth International Conference on Discovery Science (DS 2002). The volume includes 26 technical contributions which were selected by the program committee from 49 submissions. It also contains the ALT 2002 invited talks presented by Susumu Hayashi (Kobe University, Japan) on “Mathem...
This book constitutes the refereed proceedings of the 14th Annual and 5th European Conferences on Computational Learning Theory, COLT/EuroCOLT 2001, held in Amsterdam, The Netherlands, in July 2001. The 40 revised full papers presented together with one invited paper were carefully reviewed and selected from a total of 69 submissions. All current aspects of computational learning and its applications in a variety of fields are addressed.
The book is aimed at graduate students, researchers, engineers and physicists involved in fluid computations. An up-to-date account is given of the present state of the art of numerical methods employed in computational fluid dynamics. The underlying numerical principles are treated with a fair amount of detail, using elementary methods. Attention is given to the difficulties arising from geometric complexity of the flow domain. Uniform accuracy for singular perturbation problems is studied, pointing the way to accurate computation of flows at high Reynolds number. Unified methods for compressible and incompressible flows are discussed. A treatment of the shallow-water equations is included. A basic introduction is given to efficient iterative solution methods. Many pointers are given to the current literature, facilitating further study.
This book constitutes the refereed proceedings of the 17th Annual Conference on Learning Theory, COLT 2004, held in Banff, Canada in July 2004. The 46 revised full papers presented were carefully reviewed and selected from a total of 113 submissions. The papers are organized in topical sections on economics and game theory, online learning, inductive inference, probabilistic models, Boolean function learning, empirical processes, MDL, generalisation, clustering and distributed learning, boosting, kernels and probabilities, kernels and kernel matrices, and open problems.
This book constitutes the refereed proceedings of the 15th Annual Conference on Computational Learning Theory, COLT 2002, held in Sydney, Australia, in July 2002. The 26 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on statistical learning theory, online learning, inductive inference, PAC learning, boosting, and other learning paradigms.
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards.
An accessible introduction and essential reference for an approach to machine learning that creates highly accurate prediction rules by combining many weak and inaccurate ones. Boosting is an approach to machine learning based on the idea of creating a highly accurate predictor by combining many weak and inaccurate "rules of thumb." A remarkably rich theory has evolved around boosting, with connections to a range of topics, including statistics, game theory, convex optimization, and information geometry. Boosting algorithms have also enjoyed practical success in such fields as biology, vision, and speech processing. At various times in its history, boosting has been perceived as mysterious, ...