Sciweavers

773 search results - page 115 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
DEXA
2005
Springer
160views Database» more  DEXA 2005»
15 years 7 months ago
Improved Sequential Pattern Mining Using an Extended Bitmap Representation
The main challenge of mining sequential patterns is the high processing cost of support counting for large amount of candidate patterns. For solving this problem, SPAM algorithm wa...
Chien-Liang Wu, Jia-Ling Koh, Pao-Ying An
ICCBR
2005
Springer
15 years 7 months ago
Learning to Win: Case-Based Plan Selection in a Real-Time Strategy Game
While several researchers have applied case-based reasoning techniques to games, only Ponsen and Spronck (2004) have addressed the challenging problem of learning to win real-time ...
David W. Aha, Matthew Molineaux, Marc J. V. Ponsen
SLSFS
2005
Springer
15 years 7 months ago
Incorporating Constraints and Prior Knowledge into Factorization Algorithms - An Application to 3D Recovery
Abstract. Matrix factorization is a fundamental building block in many computer vision and machine learning algorithms. In this work we focus on the problem of ”structure from mo...
Amit Gruber, Yair Weiss
84
Voted
IWDW
2004
Springer
15 years 7 months ago
Informed Detection Revisited
Abstract. Watermarking systems can employ either informed detection, where the original cover work is required, or blind detection, where it is not required. While early systems us...
Jeffrey A. Bloom, Matthew L. Miller
LCPC
2004
Springer
15 years 7 months ago
HiLO: High Level Optimization of FFTs
As computing platforms become more and more complex, the task of optimizing performance critical codes becomes more challenging. Recently, more attention has been focused on automa...
Nick Rizzolo, David A. Padua