Sciweavers

2444 search results - page 33 / 489
» Feature Construction for Back-Propagation
Sort
View
87
Voted
DATE
2006
IEEE
123views Hardware» more  DATE 2006»
15 years 3 months ago
Constructing portable compiled instruction-set simulators: an ADL-driven approach
Instruction set simulators are common tools used for the development of new architectures and embedded software among countless other functions. This paper presents a framework th...
Joseph D'Errico, Wei Qin
75
Voted
STOC
2000
ACM
117views Algorithms» more  STOC 2000»
15 years 2 months ago
Faster suffix tree construction with missing suffix links
Abstract. We consider suffix tree construction for situations with missing suffix links. Two examples of such situations are suffix trees for parameterized strings and suffix trees...
Richard Cole, Ramesh Hariharan
CTRSA
2006
Springer
157views Cryptology» more  CTRSA 2006»
15 years 1 months ago
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack
Abstract. In this paper we present a general framework for constructing efficient multicast cryptosystems with provable security and show that a line of previous work on multicast ...
Yitao Duan, John F. Canny
WOWMOM
2005
ACM
112views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
A Hidden Environment Model for Constructing Indoor Radio Maps
Constructing indoor radio maps plays an important role in many services and applications such as wireless base station planning. In this paper, we propose a hybrid approach to con...
Zhe Xiang, Hangjin Zhang, Jian Huang, Song Song, K...
COMPGEOM
2003
ACM
15 years 2 months ago
Updating and constructing constrained delaunay and constrained regular triangulations by flips
I discuss algorithms based on bistellar flips for inserting and deleting constraining (d − 1)-facets in d-dimensional constrained Delaunay triangulations (CDTs) and weighted CD...
Jonathan Richard Shewchuk