Sciweavers

773 search results - page 107 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
ICML
2009
IEEE
16 years 2 months ago
Domain adaptation from multiple sources via auxiliary classifiers
We propose a multiple source domain adaptation method, referred to as Domain Adaptation Machine (DAM), to learn a robust decision function (referred to as target classifier) for l...
Lixin Duan, Ivor W. Tsang, Dong Xu, Tat-Seng Chua
ICML
2007
IEEE
16 years 2 months ago
Learning nonparametric kernel matrices from pairwise constraints
Many kernel learning methods have to assume parametric forms for the target kernel functions, which significantly limits the capability of kernels in fitting diverse patterns. Som...
Steven C. H. Hoi, Rong Jin, Michael R. Lyu
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
16 years 2 months ago
Signing a Linear Subspace: Signature Schemes for Network Coding
Network coding offers increased throughput and improved robustness to random faults in completely decentralized networks. In contrast to traditional routing schemes, however, netw...
Dan Boneh, David Freeman, Jonathan Katz, Brent Wat...
CHI
2002
ACM
16 years 2 months ago
Unremarkable computing
In this paper, we seek to contribute to the Ubiquitous Computing agenda by focusing on one of its earliest, but most difficult, design ambitions ? making technology "invisibl...
Peter Tolmie, James Pycock, Tim Diggins, Allan Mac...
RECOMB
2007
Springer
16 years 2 months ago
Learning Gene Regulatory Networks via Globally Regularized Risk Minimization
Learning the structure of a gene regulatory network from time-series gene expression data is a significant challenge. Most approaches proposed in the literature to date attempt to ...
Yuhong Guo, Dale Schuurmans