Sciweavers

780 search results - page 80 / 156
» Cost-Sharing Approximations for h
Sort
View
TGC
2007
Springer
15 years 5 months ago
Adversaries and Information Leaks (Tutorial)
Secure information flow analysis aims to prevent programs from leaking their H (high) inputs to their L (low) outputs. A major challenge in this area is to relax the standard noni...
Geoffrey Smith
MA
2010
Springer
114views Communications» more  MA 2010»
14 years 9 months ago
Finite-sample inference with monotone incomplete multivariate normal data, II
We continue our recent work on finite-sample, i.e., non-asymptotic, inference with two-step, monotone incomplete data from Nd(µ, Σ), a multivariate normal population with mean ...
Wan-Ying Chang, Donald St. P. Richards
ICPR
2000
IEEE
16 years 10 days ago
Piecewise Linear Skeletonization Using Principal Curves
We propose an algorithm to find piecewise linear skeletons of hand-written characters by using principal curves. The development of the method was inspired by the apparent similar...
Adam Krzyzak, Balázs Kégl
WWW
2009
ACM
15 years 12 months ago
Matchbox: large scale online bayesian recommendations
We present a probabilistic model for generating personalised recommendations of items to users of a web service. The Matchbox system makes use of content information in the form o...
David H. Stern, Ralf Herbrich, Thore Graepel
MIR
2010
ACM
264views Multimedia» more  MIR 2010»
15 years 5 months ago
Quest for relevant tags using local interaction networks and visual content
Typical tag recommendation systems for photos shared on social networks such as Flickr, use visual content analysis, collaborative filtering or personalization strategies to prod...
Neela Sawant, Ritendra Datta, Jia Li, James Ze Wan...