Sciweavers

214 search results - page 25 / 43
» On the separability of structural classes of communities
Sort
View
ACNS
2006
Springer
117views Cryptology» more  ACNS 2006»
15 years 3 months ago
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
We study the influence of collision-finding attacks on the security of time-stamping schemes. We distinguish between client-side hash functions used to shorten the documents befo...
Ahto Buldas, Sven Laur
ICASSP
2011
IEEE
14 years 1 months ago
3D image geo-registration using vision-based modeling
Image geo-registration is the process of relating a photograph and its pose to referenced world coordinates. The application is relevant, especially to the social networking, phot...
Karl Ni, Zachary Sun, Nadya Bliss
SDM
2011
SIAM
414views Data Mining» more  SDM 2011»
14 years 10 days ago
Clustered low rank approximation of graphs in information science applications
In this paper we present a fast and accurate procedure called clustered low rank matrix approximation for massive graphs. The procedure involves a fast clustering of the graph and...
Berkant Savas, Inderjit S. Dhillon
JCP
2007
122views more  JCP 2007»
14 years 9 months ago
Fast Information Retrieval in a Self-Organising P2P Network
— In this paper we present a formal description of PROSA, a P2P resource management system heavily inspired by social networks. Social networks have been deeply studied in the la...
Vincenza Carchiolo, Michele Malgeri, Giuseppe Mang...
CVPR
2009
IEEE
1390views Computer Vision» more  CVPR 2009»
16 years 4 months ago
Stacks of Convolutional Restricted Boltzmann Machines for Shift-Invariant Feature Learning
In this paper we present a method for learning classspecific features for recognition. Recently a greedy layerwise procedure was proposed to initialize weights of deep belief ne...
Mohammad Norouzi (Simon Fraser University), Mani R...