Sciweavers

315 search results - page 25 / 63
» Algebraic Lower Bounds for Computing on Encrypted Data
Sort
View
PAKDD
2009
ACM
94views Data Mining» more  PAKDD 2009»
15 years 5 months ago
Item Preference Parameters from Grouped Ranking Observations
Given a set of rating data for a set of items, determining the values of items is a matter of importance and various probability models have been proposed. The Plackett-Luce model ...
Hideitsu Hino, Yu Fujimoto, Noboru Murata
CORR
2010
Springer
162views Education» more  CORR 2010»
14 years 11 months ago
Networked Computing in Wireless Sensor Networks for Structural Health Monitoring
Abstract—This paper studies the problem of distributed computation over a network of wireless sensors. While this problem applies to many emerging applications, to keep our discu...
Apoorva Jindal, Mingyan Liu
CVPR
2004
IEEE
16 years 2 months ago
Minimum Effective Dimension for Mixtures of Subspaces: A Robust GPCA Algorithm and Its Applications
In this paper, we propose a robust model selection criterion for mixtures of subspaces called minimum effective dimension (MED). Previous information-theoretic model selection cri...
Kun Huang, René Vidal, Yi Ma
88
Voted
COCO
2005
Springer
128views Algorithms» more  COCO 2005»
15 years 6 months ago
More on Noncommutative Polynomial Identity Testing
We continue the study of noncommutative polynomial identity testing initiated by Raz and Shpilka and present efficient algorithms for the following problems in the noncommutative...
Andrej Bogdanov, Hoeteck Wee
ICLP
2007
Springer
15 years 4 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...