Sciweavers

2040 search results - page 155 / 408
» Approximate Expectation Maximization
Sort
View
ICDCSW
2005
IEEE
15 years 9 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
IWSOC
2003
IEEE
99views Hardware» more  IWSOC 2003»
15 years 8 months ago
A Position Control System Design
A Position Controller is a device used in many applications, such as controlling the movement of an elevator. In this paper, we examine the technological issues surrounding the de...
Robert Gulde, Michael Weeks
ICALP
2010
Springer
15 years 8 months ago
On the k-Independence Required by Linear Probing and Minwise Independence
We show that linear probing requires 5-independent hash functions for expected constant-time performance, matching an upper bound of [Pagh et al. STOC’07]. For (1 + ε)-approxima...
Mihai Patrascu, Mikkel Thorup
129
Voted
NIPS
2007
15 years 4 months ago
Discriminative Log-Linear Grammars with Latent Variables
We demonstrate that log-linear grammars with latent variables can be practically trained using discriminative methods. Central to efficient discriminative training is a hierarchi...
Slav Petrov, Dan Klein
NIPS
2001
15 years 4 months ago
Sampling Techniques for Kernel Methods
We propose randomized techniques for speeding up Kernel Principal Component Analysis on three levels: sampling and quantization of the Gram matrix in training, randomized rounding...
Dimitris Achlioptas, Frank McSherry, Bernhard Sch&...