Sciweavers

7978 search results - page 1475 / 1596
» Combining shared-coin algorithms
Sort
View
SIAMJO
2010
83views more  SIAMJO 2010»
14 years 8 months ago
The Lifted Newton Method and Its Application in Optimization
Abstract. We present a new “lifting” approach for the solution of nonlinear optimization problems (NLPs) that have objective and constraint functions with intermediate variable...
Jan Albersmeyer, Moritz Diehl
SIAMSC
2010
141views more  SIAMSC 2010»
14 years 8 months ago
An Iterative Method for Edge-Preserving MAP Estimation When Data-Noise Is Poisson
In numerous applications of image processing, e.g. astronomical and medical imaging, data-noise is well-modeled by a Poisson distribution. This motivates the use of the negative-lo...
Johnathan M. Bardsley, John Goldes
SPEECH
2010
152views more  SPEECH 2010»
14 years 8 months ago
Single-channel speech enhancement using spectral subtraction in the short-time modulation domain
In this paper we investigate the modulation domain as an alternative to the acoustic domain for speech enhancement. More specifically, we wish to determine how competitive the mo...
Kuldip K. Paliwal, Kamil Wójcicki, Belinda ...
TDSC
2010
218views more  TDSC 2010»
14 years 8 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
TKDE
2010
153views more  TKDE 2010»
14 years 8 months ago
Automatic Ontology Matching via Upper Ontologies: A Systematic Evaluation
—“Ontology matching” is the process of finding correspondences between entities belonging to different ontologies. This paper describes a set of algorithms that exploit uppe...
Viviana Mascardi, Angela Locoro, Paolo Rosso
« Prev « First page 1475 / 1596 Last » Next »