Sciweavers

679 search results - page 60 / 136
» Algorithmic modifications to SPIHT
Sort
View
SIGMOD
1998
ACM
166views Database» more  SIGMOD 1998»
15 years 7 months ago
CONTROL: Continuous Output and Navigation Technology with Refinement On-Line
The CONTROL project at U.C. Berkeley has developed technologies to provide online behavior for data-intensive applications. Using new query processing algorithms, these technologi...
Ron Avnur, Joseph M. Hellerstein, Bruce Lo, Chris ...
EUROCRYPT
1998
Springer
15 years 7 months ago
How to Improve an Exponentiation Black-Box
Abstract. In this paper we present a method for improving the performance of RSA-type exponentiations. The scheme is based on the observation that replacing the exponent d by d = d...
Gérard D. Cohen, Antoine Lobstein, David Na...
108
Voted
COLT
2008
Springer
15 years 5 months ago
High-Probability Regret Bounds for Bandit Online Linear Optimization
We present a modification of the algorithm of Dani et al. [8] for the online linear optimization problem in the bandit setting, which with high probability has regret at most O ( ...
Peter L. Bartlett, Varsha Dani, Thomas P. Hayes, S...
ACL
2008
15 years 4 months ago
Distributed Word Clustering for Large Scale Class-Based Language Modeling in Machine Translation
In statistical language modeling, one technique to reduce the problematic effects of data sparsity is to partition the vocabulary into equivalence classes. In this paper we invest...
Jakob Uszkoreit, Thorsten Brants
120
Voted
MEDIAFORENSICS
2010
15 years 4 months ago
Modern steganalysis can detect YASS
YASS is a steganographic algorithm for digital images that hides messages robustly in a key-dependent transform domain so that the stego image can be subsequently compressed and d...
Jan Kodovský, Tomás Pevný, Je...