Sciweavers

5153 search results - page 792 / 1031
» Introduction to Randomized Algorithms
Sort
View
122
Voted
KDD
2010
ACM
222views Data Mining» more  KDD 2010»
15 years 5 months ago
Large linear classification when data cannot fit in memory
Recent advances in linear classification have shown that for applications such as document classification, the training can be extremely efficient. However, most of the existing t...
Hsiang-Fu Yu, Cho-Jui Hsieh, Kai-Wei Chang, Chih-J...
189
Voted
CIVR
2008
Springer
279views Image Analysis» more  CIVR 2008»
15 years 5 months ago
Semi-supervised learning of object categories from paired local features
This paper presents a semi-supervised learning (SSL) approach to find similarities of images using statistics of local matches. SSL algorithms are well known for leveraging a larg...
Wen Wu, Jie Yang
154
Voted
COCO
2008
Springer
146views Algorithms» more  COCO 2008»
15 years 5 months ago
A Direct Product Theorem for Discrepancy
Discrepancy is a versatile bound in communication complexity which can be used to show lower bounds in the distributional, randomized, quantum, and even unbounded error models of ...
Troy Lee, Adi Shraibman, Robert Spalek
CVPR
2008
IEEE
15 years 5 months ago
Photometric stereo with coherent outlier handling and confidence estimation
In photometric stereo a robust method is required to deal with outliers, such as shadows and non-Lambertian reflections. In this paper we rely on a probabilistic imaging model tha...
Frank Verbiest, Luc J. Van Gool
120
Voted
EDCC
2008
Springer
15 years 5 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger