Sciweavers

40 search results - page 6 / 8
» The Value of Agreement, a New Boosting Algorithm
Sort
View
CIKM
2008
Springer
13 years 7 months ago
On low dimensional random projections and similarity search
Random projection (RP) is a common technique for dimensionality reduction under L2 norm for which many significant space embedding results have been demonstrated. However, many si...
Yu-En Lu, Pietro Liò, Steven Hand
KDD
2006
ACM
181views Data Mining» more  KDD 2006»
14 years 6 months ago
Cryptographically private support vector machines
We study the problem of private classification using kernel methods. More specifically, we propose private protocols implementing the Kernel Adatron and Kernel Perceptron learning ...
Helger Lipmaa, Sven Laur, Taneli Mielikäinen
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 6 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
CIARP
2007
Springer
13 years 9 months ago
Bagging with Asymmetric Costs for Misclassified and Correctly Classified Examples
Abstract. Diversity is a key characteristic to obtain advantages of combining predictors. In this paper, we propose a modification of bagging to explicitly trade off diversity and ...
Ricardo Ñanculef, Carlos Valle, Héct...
CVPR
1999
IEEE
14 years 7 months ago
Model-Guided Segmentation of Corpus Callosum in MR Images
Magnetic resonance imaging (MRI) of the brain, followed by automated segmentation of the corpus callosum (CC) in midsagittal sections have important applications in both clinical ...
Arvid Lundervold, Torfinn Taxt, Nicolae Duta, Anil...