Sciweavers

1310 search results - page 197 / 262
» Learning the k in k-means
Sort
View
CRYPTO
2005
Springer
106views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for ...
Omer Barkol, Yuval Ishai
SIGECOM
2004
ACM
165views ECommerce» more  SIGECOM 2004»
15 years 6 months ago
Adaptive limited-supply online auctions
We study a limited-supply online auction problem, in which an auctioneer has k goods to sell and bidders arrive and depart dynamically. We suppose that agent valuations are drawn ...
Mohammad Taghi Hajiaghayi, Robert D. Kleinberg, Da...
NIPS
2003
15 years 2 months ago
Boosting versus Covering
We investigate improvements of AdaBoost that can exploit the fact that the weak hypotheses are one-sided, i.e. either all its positive (or negative) predictions are correct. In pa...
Kohei Hatano, Manfred K. Warmuth
102
Voted
CVPR
2006
IEEE
16 years 2 months ago
Applying Ensembles of Multilinear Classifiers in the Frequency Domain
Ensemble methods such as bootstrap, bagging or boosting have had a considerable impact on recent developments in machine learning, pattern recognition and computer vision. Theoret...
Christian Bauckhage, Thomas Käster, John K. T...
95
Voted
ICML
2006
IEEE
16 years 1 months ago
Totally corrective boosting algorithms that maximize the margin
We consider boosting algorithms that maintain a distribution over a set of examples. At each iteration a weak hypothesis is received and the distribution is updated. We motivate t...
Gunnar Rätsch, Jun Liao, Manfred K. Warmuth