Sciweavers

1717 search results - page 55 / 344
» On the analysis of the (1 1) memetic algorithm
Sort
View
106
Voted
CRYPTO
2006
Springer
92views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
Elad Barkan, Eli Biham, Adi Shamir
ICML
2004
IEEE
16 years 1 months ago
A hierarchical method for multi-class support vector machines
We introduce a framework, which we call Divide-by-2 (DB2), for extending support vector machines (SVM) to multi-class problems. DB2 offers an alternative to the standard one-again...
Volkan Vural, Jennifer G. Dy
111
Voted
CISSE
2008
Springer
15 years 2 months ago
Testing Grammars For Top-Down Parsers
According to the software engineering perspective, grammars can be viewed as "Specifications for defining languages or compilers". They form the basics of languages and ...
A. M. Paracha, F. Franek
61
Voted
COLING
2010
14 years 7 months ago
A comparison of unsupervised methods for Part-of-Speech Tagging in Chinese
We conduct a series of Part-of-Speech (POS) Tagging experiments using Expectation Maximization (EM), Variational Bayes (VB) and Gibbs Sampling (GS) against the Chinese Penn Treeba...
Alex Cheng, Fei Xia, Jianfeng Gao
144
Voted
SDM
2012
SIAM
297views Data Mining» more  SDM 2012»
13 years 3 months ago
A Flexible Open-Source Toolbox for Scalable Complex Graph Analysis
The Knowledge Discovery Toolbox (KDT) enables domain experts to perform complex analyses of huge datasets on supercomputers using a high-level language without grappling with the ...
Adam Lugowski, David M. Alber, Aydin Buluç,...