Sciweavers

459 search results - page 76 / 92
» Mixed Models for the Analysis of Local Search Components
Sort
View
TSP
2011
165views more  TSP 2011»
14 years 6 months ago
Quaternion ICA From Second-Order Statistics
—This paper addresses the independent component analysis (ICA) of quaternion random vectors. In particular, we focus on the Gaussian case and therefore only consider the quaterni...
Javier Vía, Daniel P. Palomar, Luis Vielva,...
WDAG
2001
Springer
131views Algorithms» more  WDAG 2001»
15 years 4 months ago
The Complexity of Synchronous Iterative Do-All with Crashes
Abstract. The ability to cooperate on common tasks in a distributed setting is key to solving a broad range of computation problems ranging from distributed search such as SETI to ...
Chryssis Georgiou, Alexander Russell, Alexander A....
ICPR
2010
IEEE
14 years 12 months ago
Clustering Face Carvings: Exploring the Devatas of Angkor Wat
Abstract—We propose a framework for clustering and visualization of images of face carvings at archaeological sites. The pairwise similarities among face carvings are computed by...
Brendan Klare, Pavan Kumar Mallapragada, Anil K. J...
PKDD
2009
Springer
196views Data Mining» more  PKDD 2009»
15 years 6 months ago
Causality Discovery with Additive Disturbances: An Information-Theoretical Perspective
We consider causally sufficient acyclic causal models in which the relationship among the variables is nonlinear while disturbances have linear effects, and show that three princi...
Kun Zhang, Aapo Hyvärinen
RECSYS
2009
ACM
15 years 4 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley