Sciweavers

12836 search results - page 310 / 2568
» Generalization Methods in Bioinformatics
Sort
View
EOR
2006
86views more  EOR 2006»
15 years 4 months ago
Minimum-distance controlled perturbation methods for large-scale tabular data protection
National Statistical Agencies routinely release large amounts of tabular information. Prior to dissemination, tabular data needs to be processed to avoid the disclosure of individ...
Jordi Castro
FOCM
2007
94views more  FOCM 2007»
15 years 4 months ago
Trust-Region Methods on Riemannian Manifolds
A general scheme for trust-region methods on Riemannian manifolds is proposed and analyzed. Among the various approaches available to (approximately) solve the trust-region subpro...
Pierre-Antoine Absil, C. G. Baker, Kyle A. Galliva...
118
Voted
ML
2002
ACM
145views Machine Learning» more  ML 2002»
15 years 4 months ago
Boosting Methods for Regression
In this paper we examine ensemble methods for regression that leverage or "boost" base regressors by iteratively calling them on modified samples. The most successful lev...
Nigel Duffy, David P. Helmbold
TKDE
2002
133views more  TKDE 2002»
15 years 4 months ago
ImageMap: An Image Indexing Method Based on Spatial Similarity
We introduce ImageMap, as a method for indexing and similarity searching in Image DataBases (IDBs). ImageMap answers "queries by example", involving any number of object...
Euripides G. M. Petrakis, Christos Faloutsos, King...
ACL
2010
15 years 2 months ago
An Exact A* Method for Deciphering Letter-Substitution Ciphers
Letter-substitution ciphers encode a document from a known or hypothesized language into an unknown writing system or an unknown encoding of a known writing system. It is a proble...
Eric Corlett, Gerald Penn