Sciweavers

901 search results - page 141 / 181
» Analyzing linear mergers
Sort
View
MP
2010
135views more  MP 2010»
14 years 9 months ago
An inexact Newton method for nonconvex equality constrained optimization
Abstract We present a matrix-free line search algorithm for large-scale equality constrained optimization that allows for inexact step computations. For sufficiently convex problem...
Richard H. Byrd, Frank E. Curtis, Jorge Nocedal
PKDD
2010
Springer
172views Data Mining» more  PKDD 2010»
14 years 9 months ago
Surprising Patterns for the Call Duration Distribution of Mobile Phone Users
How long are the phone calls of mobile users? What are the chances of a call to end, given its current duration? Here we answer these questions by studying the call duration distri...
Pedro O. S. Vaz de Melo, Leman Akoglu, Christos Fa...
SEKE
2010
Springer
14 years 9 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
EMNLP
2010
14 years 8 months ago
Assessing Phrase-Based Translation Models with Oracle Decoding
Extant Statistical Machine Translation (SMT) systems are very complex softwares, which embed multiple layers of heuristics and embark very large numbers of numerical parameters. A...
Guillaume Wisniewski, Alexandre Allauzen, Fran&cce...
ERSA
2010
217views Hardware» more  ERSA 2010»
14 years 8 months ago
FPGA for Computing the Pixel Purity Index Algorithm on Hyperspectral Images
The pixel purity index algorithm is employed in remote sensing for analyzing hyperspectral images. A single pixel usually covers several different materials, and its observed spect...
Carlos González, Daniel Mozos, Javier Resan...