Sciweavers

5153 search results - page 893 / 1031
» Introduction to Randomized Algorithms
Sort
View
134
Voted
CHES
2006
Springer
134views Cryptology» more  CHES 2006»
15 years 6 months ago
Read-Proof Hardware from Protective Coatings
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient beca...
Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan v...
138
Voted
CIVR
2006
Springer
219views Image Analysis» more  CIVR 2006»
15 years 6 months ago
Bayesian Learning of Hierarchical Multinomial Mixture Models of Concepts for Automatic Image Annotation
We propose a novel Bayesian learning framework of hierarchical mixture model by incorporating prior hierarchical knowledge into concept representations of multi-level concept struc...
Rui Shi, Tat-Seng Chua, Chin-Hui Lee, Sheng Gao
151
Voted
FOCS
2004
IEEE
15 years 6 months ago
Stochastic Optimization is (Almost) as easy as Deterministic Optimization
Stochastic optimization problems attempt to model uncertainty in the data by assuming that (part of) the input is specified in terms of a probability distribution. We consider the...
David B. Shmoys, Chaitanya Swamy
CP
2006
Springer
15 years 6 months ago
Reasoning by Dominance in Not-Equals Binary Constraint Networks
Dynamic detection and elimination of symmetry in constraints, is in general a hard task, but in Not-Equals binary constraint networks, the symmetry conditions can be simplified. I...
Belaid Benhamou, Mohamed Réda Saïdi
GFKL
2006
Springer
75views Data Mining» more  GFKL 2006»
15 years 6 months ago
Classification of Contradiction Patterns
Abstract. Solving conflicts between overlapping databases requires an understanding of the reasons that lead to the inconsistencies. Provided that conflicts do not occur randomly b...
Heiko Müller, Ulf Leser, Johann Christoph Fre...