Sciweavers

59 search results - page 10 / 12
» Fast Computation on Encrypted Polynomials and Applications
Sort
View
SDM
2007
SIAM
171views Data Mining» more  SDM 2007»
13 years 7 months ago
A Better Alternative to Piecewise Linear Time Series Segmentation
Time series are difficult to monitor, summarize and predict. Segmentation organizes time series into few intervals having uniform characteristics (flatness, linearity, modality,...
Daniel Lemire
CAGD
2008
98views more  CAGD 2008»
13 years 6 months ago
Exact evaluation of limits and tangents for non-polynomial subdivision schemes
In this paper, we describe a method for exact evaluation of a limit mesh defined via subdivision and its associated tangent vectors on a uniform grid of any size. Other exact eval...
S. Schaefer, J. Warren
IMA
2009
Springer
221views Cryptology» more  IMA 2009»
14 years 25 days ago
Cache Timing Analysis of LFSR-Based Stream Ciphers
Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated ag...
Gregor Leander, Erik Zenner, Philip Hawkes
ICCV
2011
IEEE
12 years 6 months ago
Gradient-based learning of higher-order image features
Recent work on unsupervised feature learning has shown that learning on polynomial expansions of input patches, such as on pair-wise products of pixel intensities, can improve the...
Roland Memisevic
CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 6 months ago
Network Flow Algorithms for Structured Sparsity
We consider a class of learning problems that involve a structured sparsityinducing norm defined as the sum of -norms over groups of variables. Whereas a lot of effort has been pu...
Julien Mairal, Rodolphe Jenatton, Guillaume Obozin...