Sciweavers

11462 search results - page 34 / 2293
» Developing Application-Centric Methods
Sort
View
104
Voted
JMLR
2010
115views more  JMLR 2010»
14 years 10 months ago
Message-passing for Graph-structured Linear Programs: Proximal Methods and Rounding Schemes
The problem of computing a maximum a posteriori (MAP) configuration is a central computational challenge associated with Markov random fields. There has been some focus on “tr...
Pradeep Ravikumar, Alekh Agarwal, Martin J. Wainwr...
SIAMJO
2008
81views more  SIAMJO 2008»
14 years 10 months ago
A First-Order Convergence Analysis of Trust-Region Methods with Inexact Jacobians
A class of trust-region algorithms is developed and analyzed for the solution of minimization problems with nonlinear inequality constraints. Based on composite-step trust region ...
Andrea Walther
ENTCS
2002
82views more  ENTCS 2002»
14 years 11 months ago
A Hybrid Encoding of Howe's Method for Establishing Congruence of Bisimilarity
We give a short description of Hybrid, a new tool for interactive theorem proving, s introduced in [4]. It provides a form of Higher Order Abstract Syntax (HOAS) combined consiste...
Alberto Momigliano, Simon Ambler, Roy L. Crole
CORR
1998
Springer
101views Education» more  CORR 1998»
14 years 11 months ago
Methods and Tools for Building the Catalan WordNet
In this paper we introduce the methodology used and the basic phases we followed to develop the Catalan WordNet, and which lexical resources have been employed in its building. Th...
Laura Benitez, Sergi Cervell, Gerard Escudero, Mon...
CRYPTO
2012
Springer
215views Cryptology» more  CRYPTO 2012»
13 years 2 months ago
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full sec...
Allison B. Lewko, Brent Waters