Sciweavers

16404 search results - page 3135 / 3281
» A set coverage problem
Sort
View
CVPR
2010
IEEE
15 years 9 months ago
Weakly-Supervised Hashing in Kernel Space
The explosive growth of the vision data motivates the recent studies on efficient data indexing methods such as locality-sensitive hashing (LSH). Most existing approaches perform...
Yadong Mu, Jialie Shen, Shuicheng Yan
CSB
2005
IEEE
126views Bioinformatics» more  CSB 2005»
15 years 9 months ago
Identifying Simple Discriminatory Gene Vectors with an Information Theory Approach
In the feature selection of cancer classification problems, many existing methods consider genes individually by choosing the top genes which have the most significant signal-to...
Zheng Yun, Kwoh Chee Keong
DSN
2005
IEEE
15 years 9 months ago
Checking Array Bound Violation Using Segmentation Hardware
The ability to check memory references against their associated array/buffer bounds helps programmers to detect programming errors involving address overruns early on and thus avo...
Lap-Chung Lam, Tzi-cker Chiueh
HICSS
2005
IEEE
95views Biometrics» more  HICSS 2005»
15 years 9 months ago
Understanding the Effect of Risk Aversion on Risk
As we progress, society must intelligently address the following question: How much risk is acceptable? How we answer this question could have important consequences for the futur...
U. S. Bhatt, David E. Newman, Benjamin A. Carreras...
ICDCSW
2005
IEEE
15 years 9 months ago
Zmail: Zero-Sum Free Market Control of Spam
The problem of spam is a classic “tragedy of the commons” [10]. We propose the Zmail protocol as a way to preserve email as a “free” common resource for most users, while ...
Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Moha...
« Prev « First page 3135 / 3281 Last » Next »