Sciweavers

464 search results - page 53 / 93
» Authorisation Using Attributes from Multiple Authorities
Sort
View
ICAI
2009
14 years 7 months ago
Learning Mappings with Neural Network
The authors extended the idea of training multiple tasks simultaneously on a partially shared feed forward network. A shared input subvector was added to represented common inputs...
Yefei Peng, Paul W. Munro
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
15 years 2 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
IJPRAI
2002
93views more  IJPRAI 2002»
14 years 9 months ago
Improving Stability of Decision Trees
Decision-tree algorithms are known to be unstable: small variations in the training set can result in different trees and different predictions for the same validation examples. B...
Mark Last, Oded Maimon, Einat Minkov
CORR
2011
Springer
195views Education» more  CORR 2011»
14 years 1 months ago
Collective response of human populations to large-scale emergencies
Despite recent advances in uncovering the quantitative features of stationary human activity patterns, many applications, from pandemic prediction to emergency response, require a...
James P. Bagrow, Dashun Wang, Albert-Lászl&...
ICCV
1999
IEEE
15 years 11 months ago
Segmentation using Eigenvectors: A Unifying View
Automatic grouping and segmentation of images remains a challenging problem in computer vision. Recently, a number of authors have demonstrated good performance on this task using...
Yair Weiss