Sciweavers

2157 search results - page 288 / 432
» Binary ant algorithm
Sort
View
JMLR
2010
143views more  JMLR 2010»
15 years 3 months ago
A Quasi-Newton Approach to Nonsmooth Convex Optimization Problems in Machine Learning
We extend the well-known BFGS quasi-Newton method and its memory-limited variant LBFGS to the optimization of nonsmooth convex objectives. This is done in a rigorous fashion by ge...
Jin Yu, S. V. N. Vishwanathan, Simon Günter, ...
183
Voted
AICS
2009
15 years 2 months ago
Analysis of the Effect of Unexpected Outliers in the Classification of Spectroscopy Data
Multi-class classification algorithms are very widely used, but we argue that they are not always ideal from a theoretical perspective, because they assume all classes are characte...
Frank G. Glavin, Michael G. Madden
110
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Graphical models for localization of the seizure focus from interictal intracranial EEG
Decision algorithms are developed that use periods of intracranial non-seizure (interictal) EEG to localize epileptogenic networks. Depth and surface recordings are considered fro...
Justin Dauwels, Emad N. Eskandar, Andy Cole, Dan H...
135
Voted
ALGOSENSORS
2009
Springer
15 years 11 months ago
Link Reversal: How to Play Better to Work Less
Sensor networks, with their ad hoc deployments, node mobility, and wireless communication, pose serious challenges for developing provably correct and efficient applications. A po...
Bernadette Charron-Bost, Jennifer L. Welch, Josef ...
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
15 years 11 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...