Sciweavers

7623 search results - page 289 / 1525
» Constructive Volume Modeling
Sort
View
EUROCRYPT
2003
Springer
15 years 9 months ago
A Forward-Secure Public-Key Encryption Scheme
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious concern. Forward security allows one to mitigate the...
Ran Canetti, Shai Halevi, Jonathan Katz
GECCO
2006
Springer
265views Optimization» more  GECCO 2006»
15 years 8 months ago
Cutting stock waste reduction using genetic algorithms
A new model for the One-dimensional Cutting Stock problem using Genetic Algorithms (GA) is developed to optimize construction steel bars waste. One-dimensional construction stocks...
Yaser M. A. Khalifa, O. Salem, A. Shahin
ECCV
2002
Springer
16 years 6 months ago
Representing Edge Models via Local Principal Component Analysis
Edge detection depends not only upon the assumed model of what an edge is, but also on how this model is represented. The problem of how to represent the edge model is typically ne...
Patrick S. Huggins, Steven W. Zucker
GLOBECOM
2010
IEEE
15 years 2 months ago
Transmission Strategies for Gaussian Relay Networks Obtained from Deterministic Models
A constant gap between the deterministic model of a class of a wireless relay network and its Gaussian model counterpart is derived. The method is constructive in the sense that a ...
Nicolas Schrammar, Mikael Skoglund
KDD
2002
ACM
118views Data Mining» more  KDD 2002»
16 years 4 months ago
SECRET: a scalable linear regression tree algorithm
Recently there has been an increasing interest in developing regression models for large datasets that are both accurate and easy to interpret. Regressors that have these properti...
Alin Dobra, Johannes Gehrke