Sciweavers

2916 search results - page 409 / 584
» Generating Rule Sets from Model Trees
Sort
View
TMC
2008
123views more  TMC 2008»
15 years 4 months ago
Learning Adaptive Temporal Radio Maps for Signal-Strength-Based Location Estimation
In wireless networks, a client's locations can be estimated using signal strength received from signal transmitters. Static fingerprint-based techniques are commonly used for ...
Jie Yin, Qiang Yang, Lionel M. Ni
136
Voted
SIGMOD
2002
ACM
134views Database» more  SIGMOD 2002»
16 years 4 months ago
QURSED: querying and reporting semistructured data
QURSED enables the development of web-based query forms and reports (QFRs) that query and report semistructured XML data, i.e., data that are characterized by nesting, irregularit...
Yannis Papakonstantinou, Michalis Petropoulos, Vas...
CRYPTO
2003
Springer
101views Cryptology» more  CRYPTO 2003»
15 years 10 months ago
The Impact of Decryption Failures on the Security of NTRU Encryption
NTRUEncrypt is unusual among public-key cryptosystems in that, with standard parameters, validly generated ciphertexts can fail to decrypt. This affects the provable security prop...
Nick Howgrave-Graham, Phong Q. Nguyen, David Point...
NIPS
2001
15 years 6 months ago
Bayesian Predictive Profiles With Applications to Retail Transaction Data
Massive transaction data sets are recorded in a routine manner in telecommunications, retail commerce, and Web site management. In this paper we address the problem of inferring p...
Igor V. Cadez, Padhraic Smyth
141
Voted
ICANN
2003
Springer
15 years 9 months ago
Sparse Coding with Invariance Constraints
We suggest a new approach to optimize the learning of sparse features under the constraints of explicit transformation symmetries imposed on the set of feature vectors. Given a set...
Heiko Wersing, Julian Eggert, Edgar Körner