Sciweavers

457 search results - page 86 / 92
» A relative trust-region algorithm for independent component ...
Sort
View
IEEESP
2007
98views more  IEEESP 2007»
14 years 9 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
STOC
2010
ACM
181views Algorithms» more  STOC 2010»
14 years 9 months ago
Load balancing and orientability thresholds for random hypergraphs
Let h > w > 0 be two fixed integers. Let H be a random hypergraph whose hyperedges are uniformly of size h. To w-orient a hyperedge, we assign exactly w of its vertices posi...
Pu Gao, Nicholas C. Wormald
CORR
2006
Springer
160views Education» more  CORR 2006»
14 years 9 months ago
Frugality ratios and improved truthful mechanisms for vertex cover
In set-system auctions, there are several overlapping teams of agents, and a task that can be completed by any of these teams. The auctioneer's goal is to hire a team and pay...
Edith Elkind, Leslie Ann Goldberg, Paul W. Goldber...
83
Voted
SIAMDM
2008
79views more  SIAMDM 2008»
14 years 9 months ago
Testing Triangle-Freeness in General Graphs
In this paper we consider the problem of testing whether a graph is triangle-free, and more generally, whether it is H-free, for a fixed subgraph H. The algorithm should accept gr...
Noga Alon, Tali Kaufman, Michael Krivelevich, Dana...
CIVR
2009
Springer
130views Image Analysis» more  CIVR 2009»
15 years 4 months ago
Exploring inter-concept relationship with context space for semantic video indexing
Semantic concept detectors are often individually and independently developed. Using peripherally related concepts for leveraging the power of joint detection, which is referred t...
Xiao-Yong Wei, Yu-Gang Jiang, Chong-Wah Ngo