Sciweavers

922 search results - page 142 / 185
» On a Generalization of the Stone-Weierstrass Theorem
Sort
View
ICIP
1994
IEEE
15 years 6 months ago
Spatially-Variant Mathematical Morphology
We develop a general theory of spatially-variant (SV) mathematical morphology for binary images in the Euclidean space. The basic SV morphological operators (that is, SV erosion, S...
Mohammed Charif-Chefchaouni, Dan Schonfeld
NIPS
2008
15 years 3 months ago
On the Complexity of Linear Prediction: Risk Bounds, Margin Bounds, and Regularization
This work characterizes the generalization ability of algorithms whose predictions are linear in the input vector. To this end, we provide sharp bounds for Rademacher and Gaussian...
Sham M. Kakade, Karthik Sridharan, Ambuj Tewari
ICFP
2009
ACM
16 years 2 months ago
Effective interactive proofs for higher-order imperative programs
We present a new approach for constructing and verifying higherorder, imperative programs using the Coq proof assistant. We build on the past work on the Ynot system, which is bas...
Adam J. Chlipala, J. Gregory Malecha, Greg Morrise...
STOC
2009
ACM
171views Algorithms» more  STOC 2009»
16 years 2 months ago
On the geometry of graphs with a forbidden minor
We study the topological simplification of graphs via random embeddings, leading ultimately to a reduction of the Gupta-Newman-Rabinovich-Sinclair (GNRS) L1 embedding conjecture t...
James R. Lee, Anastasios Sidiropoulos
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
16 years 2 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé