Sciweavers

2841 search results - page 102 / 569
» A Call to Order
Sort
View
JMLR
2007
104views more  JMLR 2007»
14 years 9 months ago
Comments on the "Core Vector Machines: Fast SVM Training on Very Large Data Sets"
In a recently published paper in JMLR, Tsang et al. (2005) present an algorithm for SVM called Core Vector Machines (CVM) and illustrate its performances through comparisons with ...
Gaëlle Loosli, Stéphane Canu
COMGEO
2004
ACM
14 years 9 months ago
Kinetic collision detection between two simple polygons
We design a kinetic data structure for detecting collisions between two simple polygons in motion. In order to do so, we create a planar subdivision of the free space between the ...
Julien Basch, Jeff Erickson, Leonidas J. Guibas, J...
TIP
1998
108views more  TIP 1998»
14 years 9 months ago
Holographic representations of images
Abstract— We discuss a new type of holographic image representations that have advantages in a “distributed” world. We call these representations holographic. Arbitrary porti...
Alfred M. Bruckstein, Robert J. Holt, Arun N. Netr...
TSMC
2002
105views more  TSMC 2002»
14 years 9 months ago
V-Lab-a virtual laboratory for autonomous agents-SLA-based learning controllers
In this paper, we present the use of stochastic learning automata (SLA) in mutliagent robotics. In order to fully utilize and implement learning control algorithms in the control o...
Aly I. El-Osery, John Burge, Mohammad Jamshidi, An...
CISC
2009
Springer
185views Cryptology» more  CISC 2009»
14 years 7 months ago
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages
In [10], Buchmann, Pyshkin and Weinmann have described two families of Feistel and SPN block ciphers called Flurry and Curry respectively. These two families of ciphers are fully p...
Jean-Charles Faugère, Ludovic Perret