Sciweavers

457 search results - page 69 / 92
» A relative trust-region algorithm for independent component ...
Sort
View
87
Voted
ACISP
2008
Springer
15 years 4 months ago
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
The elastic block cipher design employs the round function of a given, b-bit block cipher in a black box fashion, embedding it in a network structure to construct a family of ciphe...
Debra L. Cook, Moti Yung, Angelos D. Keromytis
MMM
2011
Springer
368views Multimedia» more  MMM 2011»
14 years 1 months ago
Correlated PLSA for Image Clustering
Probabilistic Latent Semantic Analysis (PLSA) has become a popular topic model for image clustering. However, the traditional PLSA method considers each image (document) independen...
Peng Li, Jian Cheng, Zechao Li, Hanqing Lu
BMCBI
2008
119views more  BMCBI 2008»
14 years 9 months ago
Integrated multi-level quality control for proteomic profiling studies using mass spectrometry
Background: Proteomic profiling using mass spectrometry (MS) is one of the most promising methods for the analysis of complex biological samples such as urine, serum and tissue fo...
David A. Cairns, David N. Perkins, Anthea J. Stanl...
ICML
2007
IEEE
15 years 10 months ago
The matrix stick-breaking process for flexible multi-task learning
In multi-task learning our goal is to design regression or classification models for each of the tasks and appropriately share information between tasks. A Dirichlet process (DP) ...
Ya Xue, David B. Dunson, Lawrence Carin
74
Voted
TCSV
2008
134views more  TCSV 2008»
14 years 9 months ago
Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain
Watermark resistance to geometric attacks is an important issue in the image watermarking community. Most countermeasures proposed in the literature usually focus on the problem of...
Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang