Sciweavers

1209 search results - page 211 / 242
» Approximation by pseudo-linear operators
Sort
View
ICIP
2004
IEEE
16 years 3 months ago
Robust perceptual image hashing via matrix invariants
In this paper we suggest viewing images (as well as attacks on them) as a sequence of linear operators and propose novel hashing algorithms employing transforms that are based on ...
Mehmet Kivanç Mihçak, Ramarathnam Ve...
ICDE
2007
IEEE
148views Database» more  ICDE 2007»
16 years 3 months ago
Efficient Detection of Distributed Constraint Violations
In many distributed environments, the primary function of monitoring software is to detect anomalies, that is, instances when system behavior deviates substantially from the norm....
Shipra Agrawal, Supratim Deb, K. V. M. Naidu, Raje...
ICDE
2007
IEEE
114views Database» more  ICDE 2007»
16 years 3 months ago
A Load Shedding Framework and Optimizations for M-way Windowed Stream Joins
Tuple dropping, though commonly used for load shedding in most stream operations, is inadequate for m-way, windowed stream joins. The join output rate can be overly reduced becaus...
Bugra Gedik, Kun-Lung Wu, Philip S. Yu, Ling Liu
ICPR
2000
IEEE
16 years 3 months ago
General Bias/Variance Decomposition with Target Independent Variance of Error Functions Derived from the Exponential Family of D
An important theoretical tool in machine learning is the bias/variance decomposition of the generalization error. It was introduced for the mean square error in [3]. The bias/vari...
Jakob Vogdrup Hansen, Tom Heskes
WWW
2005
ACM
16 years 2 months ago
Sampling search-engine results
We consider the problem of efficiently sampling Web search engine query results. In turn, using a small random sample instead of the full set of results leads to efficient approxi...
Aris Anagnostopoulos, Andrei Z. Broder, David Carm...