Sciweavers

7978 search results - page 224 / 1596
» Combining shared-coin algorithms
Sort
View
ICMLA
2009
15 years 2 months ago
Discovering Characterization Rules from Rankings
For many ranking applications we would like to understand not only which items are top-ranked, but also why they are top-ranked. However, many of the best ranking algorithms (e.g....
Ansaf Salleb-Aouissi, Bert C. Huang, David L. Walt...
IJAR
2010
98views more  IJAR 2010»
15 years 1 months ago
Variable elimination for influence diagrams with super value nodes
In the original formulation of influence diagrams (IDs), each model contained exactly one utility node. Tatman and Shachter (1990), introduced the possibility of having super-valu...
Manuel Luque, Francisco Javier Díez
JMIV
2011
138views more  JMIV 2011»
14 years 11 months ago
Direct Sparse Deblurring
We propose a deblurring algorithm that explicitly takes into account the sparse characteristics of natural images and does not entail solving a numerically ill-conditioned backwar...
Yifei Lou, Andrea L. Bertozzi, Stefano Soatto
IJNSEC
2010
146views more  IJNSEC 2010»
14 years 11 months ago
A Novel Digital Envelope Approach for A Secure E-Commerce Channel
Data privacy and integrity will be the crucial and significant factors in recent times for trade which will be transacted over the Internet through e-commerce and mcommerce channe...
Ramachandran Ganesan, Mohan Gobi, Kanniappan Vivek...
VC
2010
212views more  VC 2010»
14 years 11 months ago
Interactive evolutionary 3D fractal modeling
In this research we present a technique for the automatic generation of 3D art form, which allows designers to get access to large number of 3D shapes that can be altered interact...
Wenjun Pang, K. C. Hui