Sciweavers

1585 search results - page 284 / 317
» Automatically optimizing secure computation
Sort
View
SIGIR
2004
ACM
15 years 5 months ago
Usefulness of hyperlink structure for query-biased topic distillation
In this paper, we introduce an information theoretic method for estimating the usefulness of the hyperlink structure induced from the set of retrieved documents. We evaluate the e...
Vassilis Plachouras, Iadh Ounis
LOPSTR
2004
Springer
15 years 5 months ago
Determinacy Analysis for Logic Programs Using Mode and Type Information
We propose an analysis for detecting procedures and goals that are deterministic (i.e. that produce at most one solution), or predicates whose clause tests are mutually exclusive (...
Pedro López-García, Francisco Bueno,...
SSPR
2004
Springer
15 years 5 months ago
Clustering Variable Length Sequences by Eigenvector Decomposition Using HMM
We present a novel clustering method using HMM parameter space and eigenvector decomposition. Unlike the existing methods, our algorithm can cluster both constant and variable leng...
Fatih Murat Porikli
74
Voted
PG
2003
IEEE
15 years 5 months ago
Lightweight Face Relighting
In this paper we present a method to relight human faces in real time, using consumer-grade graphics cards even with limited 3D capabilities. We show how to render faces using a c...
Sylvain Paris, François X. Sillion, Long Qu...
GECCO
2003
Springer
127views Optimization» more  GECCO 2003»
15 years 5 months ago
Complex Function Sets Improve Symbolic Discriminant Analysis of Microarray Data
Abstract. Our ability to simultaneously measure the expression levels of thousands of genes in biological samples is providing important new opportunities for improving the diagnos...
David M. Reif, Bill C. White, Nancy Olsen, Thomas ...