Sciweavers

7978 search results - page 144 / 1596
» Combining shared-coin algorithms
Sort
View
99
Voted
PPSC
1997
15 years 4 months ago
A Parallel Algorithm for Interval Polynomial Interpolation
By taking data measurement errors into considerations, numerical results obtained by interval polynomial interpolation [5] are highly reliable. To reduce overestimation, combinati...
Chenyi Hu
110
Voted
ICASSP
2010
IEEE
15 years 3 months ago
A compressive sensing image compression algorithm using quantized DCT and noiselet information
Inspired by recent theoretical advances in compressive sensing (CS), we propose a new framework that combines the classical local discrete cosine transform used in image compressi...
Jiangtao Wen, Zhuoyuan Chen, Yuxing Han, John D. V...
116
Voted
IPM
2008
85views more  IPM 2008»
15 years 3 months ago
A new variant of the Pathfinder algorithm to generate large visual science maps in cubic time
In the last few years, there is an increasing interest to generate visual representations of very large scientific domains. A methodology based on the combined use of ISI
Arnaud Quirin, Oscar Cordón, Jose Santamar&...
136
Voted
NETWORKS
2006
15 years 3 months ago
A simple algorithm that proves half-integrality of bidirected network programming
In a bidirected graph, each end of each edge is independently oriented. We show how to express any column of the incidence matrix as a half-integral linear combination of any colum...
Ethan D. Bolker, Thomas Zaslavsky
122
Voted
DSN
2005
IEEE
15 years 9 months ago
The Effects of Algorithmic Diversity on Anomaly Detector Performance
Common practice in anomaly-based intrusion detection assumes that one size fits all: a single anomaly detector should detect all anomalies. Compensation for any performance short...
Kymie M. C. Tan, Roy A. Maxion