Sciweavers

3370 search results - page 587 / 674
» Adding Networks
Sort
View
STORAGESS
2005
ACM
15 years 10 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
ICANN
2005
Springer
15 years 10 months ago
Online Learning for Object Recognition with a Hierarchical Visual Cortex Model
We present an architecture for the online learning of object representations based on a visual cortex hierarchy developed earlier. We use the output of a topographical feature hier...
Stephan Kirstein, Heiko Wersing, Edgar Körner
IWANN
2005
Springer
15 years 10 months ago
Heuristic Search over a Ranking for Feature Selection
In this work, we suggest a new feature selection technique that lets us use the wrapper approach for finding a well suited feature set for distinguishing experiment classes in hig...
Roberto Ruiz, José Cristóbal Riquelm...
PCI
2005
Springer
15 years 10 months ago
Gossip-Based Greedy Gaussian Mixture Learning
Abstract. It has been recently demonstrated that the classical EM algorithm for learning Gaussian mixture models can be successfully implemented in a decentralized manner by resort...
Nikos A. Vlassis, Yiannis Sfakianakis, Wojtek Kowa...
WOSS
2004
ACM
15 years 10 months ago
An extensible framework for autonomic analysis and improvement of distributed deployment architectures
A distributed software system’s deployment architecture can have a significant impact on the system’s properties, which depend on various system parameters, such as network ba...
Sam Malek, Marija Mikic-Rakic, Nenad Medvidovic