Sciweavers

2570 search results - page 339 / 514
» Fast Algorithms For The Computation Of Ranklets
Sort
View
ADMA
2010
Springer
271views Data Mining» more  ADMA 2010»
14 years 10 months ago
Exploiting Concept Clumping for Efficient Incremental E-Mail Categorization
We introduce a novel approach to incremental e-mail categorization based on identifying and exploiting "clumps" of messages that are classified similarly. Clumping reflec...
Alfred Krzywicki, Wayne Wobcke
159
Voted
CORR
2011
Springer
261views Education» more  CORR 2011»
14 years 10 months ago
Convex and Network Flow Optimization for Structured Sparsity
We consider a class of learning problems regularized by a structured sparsity-inducing norm defined as the sum of 2- or ∞-norms over groups of variables. Whereas much effort ha...
Julien Mairal, Rodolphe Jenatton, Guillaume Obozin...
DASIP
2010
14 years 10 months ago
RVC: A multi-decoder CAL Composer tool
The Reconfigurable Video Coding (RVC) framework is a recent ISO standard aiming at providing a unified specification of MPEG video technology in the form of a library of component...
Francesca Palumbo, Danilo Pani, Emanuele Manca, Lu...
208
Voted
TSMC
2010
14 years 10 months ago
Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network Systems
Abstract--With the ever-increasing wireless/wired data applications recently, considerable efforts have focused on the design of distributed explicit rate flow control schemes for ...
Naixue Xiong, Athanasios V. Vasilakos, Laurence Ti...
176
Voted
FSE
2011
Springer
264views Cryptology» more  FSE 2011»
14 years 7 months ago
An Improved Algebraic Attack on Hamsi-256
Hamsi is one of the 14 second-stage candidates in NIST’s SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version publi...
Itai Dinur, Adi Shamir