Sciweavers

3143 search results - page 520 / 629
» Minimization of entropy functionals
Sort
View
131
Voted
ICISC
2001
162views Cryptology» more  ICISC 2001»
15 years 5 months ago
Content Extraction Signatures
Motivated by emerging needs in online interactions, we define a new type of digital signature called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a...
Ron Steinfeld, Laurence Bull, Yuliang Zheng
150
Voted
MSV
2004
15 years 5 months ago
MABAC - Matrix Based Clustering Algorithm
Clustering is a prominent method in the data mining field. It is a discovery process that groups data such that intra cluster similarity is maximized and the inter cluster similar...
Yonghui Chen, Alan P. Sprague, Kevin D. Reilly
143
Voted
NETWORKING
2004
15 years 5 months ago
Multi-objective Egress Router Selection Policies for Inter-domain Traffic with Bandwidth Guarantees
The next generation Internet is designed to accommodate flows that span across multiple domains with quality of service guarantees, in particular bandwidth. In this context, destin...
Kin-Hon Ho, Ning Wang, Panos Trimintzios, George P...
137
Voted
NIPS
2004
15 years 5 months ago
Reducing Spike Train Variability: A Computational Theory Of Spike-Timing Dependent Plasticity
Experimental studies have observed synaptic potentiation when a presynaptic neuron fires shortly before a postsynaptic neuron, and synaptic depression when the presynaptic neuron ...
Sander M. Bohte, Michael C. Mozer
143
Voted
NIPS
2001
15 years 5 months ago
Online Learning with Kernels
Abstract--Kernel-based algorithms such as support vector machines have achieved considerable success in various problems in batch setting, where all of the training data is availab...
Jyrki Kivinen, Alex J. Smola, Robert C. Williamson