Sciweavers

3643 search results - page 654 / 729
» Learning Submodular Functions
Sort
View
CDC
2008
IEEE
145views Control Systems» more  CDC 2008»
15 years 2 months ago
Necessary and sufficient conditions for success of the nuclear norm heuristic for rank minimization
Minimizing the rank of a matrix subject to constraints is a challenging problem that arises in many applications in control theory, machine learning, and discrete geometry. This c...
Benjamin Recht, Weiyu Xu, Babak Hassibi
108
Voted
C++
1994
128views more  C++ 1994»
15 years 3 months ago
Implementing Signatures for C++
ne the design and detail the implementation of a language extension for abstracting types and for decoupling subtyping and inheritance in C++. This extension gives the user more of...
Gerald Baumgartner, Vincent F. Russo
BIOSYSTEMS
2008
72views more  BIOSYSTEMS 2008»
15 years 2 months ago
The manipulation of calcium oscillations by harnessing self-organisation
This paper investigates how self-organisation might be harnessed for the manipulation and control of calcium oscillations. Calcium signalling mechanisms are responsible for a numb...
Cristina Costa Santini, Andy M. Tyrrell
108
Voted
CGF
2008
149views more  CGF 2008»
15 years 2 months ago
Image-based Aging Using Evolutionary Computing
Aging has considerable visual effects on the human face and is difficult to simulate using a universally-applicable global model. In this paper, we focus on the hypothesis that th...
Daniel Hubball, Min Chen, Phil W. Grant
CORR
2010
Springer
149views Education» more  CORR 2010»
15 years 2 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh