Sciweavers

24529 search results - page 4522 / 4906
» Computing on Authenticated Data
Sort
View
JMLR
2006
156views more  JMLR 2006»
15 years 4 months ago
Large Scale Multiple Kernel Learning
While classical kernel-based learning algorithms are based on a single kernel, in practice it is often desirable to use multiple kernels. Lanckriet et al. (2004) considered conic ...
Sören Sonnenburg, Gunnar Rätsch, Christi...
149
Voted
JMLR
2006
118views more  JMLR 2006»
15 years 4 months ago
Learning Factor Graphs in Polynomial Time and Sample Complexity
We study the computational and sample complexity of parameter and structure learning in graphical models. Our main result shows that the class of factor graphs with bounded degree...
Pieter Abbeel, Daphne Koller, Andrew Y. Ng
JMM2
2006
99views more  JMM2 2006»
15 years 4 months ago
Spontaneous Emotional Facial Expression Detection
Change in a speaker's emotion is a fundamental component in human communication. Automatic recognition of spontaneous emotion would significantly impact human-computer interac...
Zhihong Zeng, Yun Fu, Glenn I. Roisman, Zhen Wen, ...
131
Voted
JMM2
2006
129views more  JMM2 2006»
15 years 4 months ago
Delivering Audio and Video with Rich Site Summary Enclosures
- Rich Site Summary (RSS) technology is a web content syndication format commonly used to organise news and the content of news-like sites. Indeed any information that can be broke...
Kevin Curran, Sheila McKinney
150
Voted
MANSCI
2008
122views more  MANSCI 2008»
15 years 4 months ago
Incorporating Asymmetric Distributional Information in Robust Value-at-Risk Optimization
Value-at-Risk (VaR) is one of the most widely accepted risk measures in the financial and insurance industries, yet efficient optimization of VaR remains a very difficult problem....
Karthik Natarajan, Dessislava Pachamanova, Melvyn ...
« Prev « First page 4522 / 4906 Last » Next »