Sciweavers

683 search results - page 31 / 137
» A Fine-grained Analysis of a Simple Independent Set Algorith...
Sort
View
129
Voted
FDTC
2006
Springer
120views Cryptology» more  FDTC 2006»
15 years 7 months ago
Blinded Fault Resistant Exponentiation
As the core operation of many public key cryptosystems, group exponentiation is central to cryptography. Attacks on its implementation in embedded device setting is hence of great ...
Guillaume Fumaroli, David Vigilant
274
Voted
PADL
2009
Springer
16 years 4 months ago
Using Bloom Filters for Large Scale Gene Sequence Analysis in Haskell
Analysis of biological data often involves large data sets and computationally expensive algorithms. Databases of biological data continue to grow, leading to an increasing demand ...
Ketil Malde, Bryan O'Sullivan
123
Voted
IBPRIA
2007
Springer
15 years 9 months ago
Parsimonious Kernel Fisher Discrimination
Abstract. By applying recent results in optimization transfer, a new algorithm for kernel Fisher Discriminant Analysis is provided that makes use of a non-smooth penalty on the coe...
Kitsuchart Pasupa, Robert F. Harrison, Peter Wille...
133
Voted
NIPS
2004
15 years 5 months ago
Online Bounds for Bayesian Algorithms
We present a competitive analysis of Bayesian learning algorithms in the online learning setting and show that many simple Bayesian algorithms (such as Gaussian linear regression ...
Sham M. Kakade, Andrew Y. Ng
129
Voted
CVPR
2004
IEEE
16 years 5 months ago
Multibody Factorization with Uncertainty and Missing Data Using the EM Algorithm
Multibody factorization algorithms [2, 1, 16] give an elegant and simple solution to the problem of structure from motion even for scenes containing multiple independent motions. ...
Amit Gruber, Yair Weiss