Sciweavers

903 search results - page 43 / 181
» On the reduction of a random basis
Sort
View
PROVSEC
2009
Springer
15 years 6 months ago
Oracle Separation in the Non-uniform Model
Abstract. Oracle separation methods are used in cryptography to rule out blackbox reductions between cryptographic primitives. It is sufficient to find an oracle relative to whic...
Ahto Buldas, Sven Laur, Margus Niitsoo
161
Voted
ESANN
2006
15 years 3 months ago
Random Forests Feature Selection with K-PLS: Detecting Ischemia from Magnetocardiograms
Random Forests were introduced by Breiman for feature (variable) selection and improved predictions for decision tree models. The resulting model is often superior to AdaBoost and ...
Long Han, Mark J. Embrechts, Boleslaw K. Szymanski...
WEWORC
2007
132views Cryptology» more  WEWORC 2007»
15 years 3 months ago
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
Abstract. Courtois, Finiasz and Sendrier proposed in 2001 a practical code-based signature scheme. We give a rigorous security analysis of a modified version of this scheme in the...
Léonard Dallot
ISCAS
2006
IEEE
96views Hardware» more  ISCAS 2006»
15 years 8 months ago
On the initialization of the DNMF algorithm
— A subspace supervised learning algorithm named Discriminant Non-negative Matrix Factorization (DNMF) has been recently proposed for classifying human facial expressions. It dec...
Ioan Buciu, Nikos Nikolaidis, Ioannis Pitas
JMLR
2008
83views more  JMLR 2008»
15 years 1 months ago
Generalization from Observed to Unobserved Features by Clustering
We argue that when objects are characterized by many attributes, clustering them on the basis of a random subset of these attributes can capture information on the unobserved attr...
Eyal Krupka, Naftali Tishby