Sciweavers

841 search results - page 133 / 169
» Constructions for Clumps Statistics
Sort
View
CORR
2011
Springer
210views Education» more  CORR 2011»
14 years 6 months ago
Online Learning of Rested and Restless Bandits
In this paper we study the online learning problem involving rested and restless multiarmed bandits with multiple plays. The system consists of a single player/user and a set of K...
Cem Tekin, Mingyan Liu
ECCC
2011
183views ECommerce» more  ECCC 2011»
14 years 6 months ago
Extractors and Lower Bounds for Locally Samplable Sources
We consider the problem of extracting randomness from sources that are efficiently samplable, in the sense that each output bit of the sampler only depends on some small number d ...
Anindya De, Thomas Watson
PAMI
2011
14 years 6 months ago
Approximate Nearest Subspace Search
—Subspaces offer convenient means of representing information in many pattern recognition, machine vision, and statistical learning applications. Contrary to the growing populari...
Ronen Basri, Tal Hassner, Lihi Zelnik-Manor
110
Voted
PAMI
2011
14 years 6 months ago
Facial Deblur Inference Using Subspace Analysis for Recognition of Blurred Faces
— This paper proposes a novel method for recognizing faces degraded by blur using deblurring of facial images. The main issue is how to infer a Point Spread Function (PSF) repres...
Masashi Nishiyama, Abdenour Hadid, Hidenori Takesh...
JDCTA
2010
175views more  JDCTA 2010»
14 years 6 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang