Sciweavers

17770 search results - page 3526 / 3554
» A Generalization of Forward-Backward Algorithm
Sort
View
IJISEC
2007
61views more  IJISEC 2007»
14 years 9 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
88
Voted
SMA
2008
ACM
150views Solid Modeling» more  SMA 2008»
14 years 9 months ago
Surface matching using consistent pants decomposition
Surface matching is fundamental to shape computing and various downstream applications. This paper develops a powerful pants decomposition framework for computing maps between sur...
Xin Li, Xianfeng Gu, Hong Qin
AIM
2005
14 years 9 months ago
Semantic Integration in Text: From Ambiguous Names to Identifiable Entities
Intelligent access to information requires semantic integration of structured databases with unstructured textual resources. While the semantic integration problem has been widely...
Xin Li, Paul Morie, Dan Roth
IJON
2007
88views more  IJON 2007»
14 years 9 months ago
Information maximization in face processing
This perspective paper explores principles of unsupervised learning and how they relate to face recognition. Dependency coding and information maximization appear to be central pr...
Marian Stewart Bartlett
IJON
2007
184views more  IJON 2007»
14 years 9 months ago
Convex incremental extreme learning machine
Unlike the conventional neural network theories and implementations, Huang et al. [Universal approximation using incremental constructive feedforward networks with random hidden n...
Guang-Bin Huang, Lei Chen
« Prev « First page 3526 / 3554 Last » Next »