Sciweavers

8575 search results - page 1630 / 1715
» A Model of Learning Using the Internet
Sort
View
PKC
2012
Springer
279views Cryptology» more  PKC 2012»
13 years 7 days ago
Circular and KDM Security for Identity-Based Encryption
We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (I...
Jacob Alperin-Sheriff, Chris Peikert
SDM
2012
SIAM
282views Data Mining» more  SDM 2012»
13 years 7 days ago
Citation Prediction in Heterogeneous Bibliographic Networks
To reveal information hiding in link space of bibliographical networks, link analysis has been studied from different perspectives in recent years. In this paper, we address a no...
Xiao Yu, Quanquan Gu, Mianwei Zhou, Jiawei Han
ICCV
2009
IEEE
16 years 1 months ago
Sparsity Induced Similarity Measure for Label Propagation
Graph-based semi-supervised learning has gained considerable interests in the past several years thanks to its effectiveness in combining labeled and unlabeled data through labe...
Hong Cheng, Zicheng Liu, Jie Yang
CVPR
1998
IEEE
15 years 12 months ago
An Optimized Interaction Strategy for Bayesian Relevance Feedback
A new algorithm and systematic evaluation is presented for searching a database via relevance feedback. It represents a new image display strategy for the PicHunter system [2, 1]....
Ingemar J. Cox, Matthew L. Miller, Thomas P. Minka...
CVPR
2001
IEEE
15 years 12 months ago
Bayesian Color Constancy for Outdoor Object Recognition
Outdoor scene classification is challenging due to irregular geometry, uncontrolled illumination, and noisy reflectance distributions. This paper discusses a Bayesian approach to ...
Yanghai Tsin, Robert T. Collins, Visvanathan Rames...
« Prev « First page 1630 / 1715 Last » Next »