Sciweavers

3370 search results - page 587 / 674
» Adding Networks
Sort
View
124
Voted
STORAGESS
2005
ACM
15 years 8 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
129
Voted
ICANN
2005
Springer
15 years 8 months ago
Online Learning for Object Recognition with a Hierarchical Visual Cortex Model
We present an architecture for the online learning of object representations based on a visual cortex hierarchy developed earlier. We use the output of a topographical feature hier...
Stephan Kirstein, Heiko Wersing, Edgar Körner
119
Voted
IWANN
2005
Springer
15 years 8 months ago
Heuristic Search over a Ranking for Feature Selection
In this work, we suggest a new feature selection technique that lets us use the wrapper approach for finding a well suited feature set for distinguishing experiment classes in hig...
Roberto Ruiz, José Cristóbal Riquelm...
PCI
2005
Springer
15 years 8 months ago
Gossip-Based Greedy Gaussian Mixture Learning
Abstract. It has been recently demonstrated that the classical EM algorithm for learning Gaussian mixture models can be successfully implemented in a decentralized manner by resort...
Nikos A. Vlassis, Yiannis Sfakianakis, Wojtek Kowa...
128
Voted
WOSS
2004
ACM
15 years 8 months ago
An extensible framework for autonomic analysis and improvement of distributed deployment architectures
A distributed software system’s deployment architecture can have a significant impact on the system’s properties, which depend on various system parameters, such as network ba...
Sam Malek, Marija Mikic-Rakic, Nenad Medvidovic