Sciweavers

5344 search results - page 180 / 1069
» Privacy-Preserving Set Operations
Sort
View
ISDA
2009
IEEE
15 years 10 months ago
Clustering-Based Feature Selection in Semi-supervised Problems
— In this contribution a feature selection method in semi-supervised problems is proposed. This method selects variables using a feature clustering strategy, using a combination ...
Ianisse Quinzán, José Manuel Sotoca,...
ISMM
2009
Springer
15 years 10 months ago
Morphological Exploration of Shape Spaces
The aim of this paper is to propose efficient tools for analysing shape families using morphological operators. The developments include the definition of shape statistics (mean a...
Jesús Angulo, Fernand Meyer
130
Voted
CISS
2008
IEEE
15 years 10 months ago
The Dantzig selector and generalized thresholding
Abstract—The Dantzig selector is a recently introduced technique for near-optimal estimatation of sparse signals from a limited set of measurements. This paper offers an interpre...
Justin K. Romberg
106
Voted
IAT
2008
IEEE
15 years 9 months ago
Obligations with Deadlines and Maintained Interdictions in Privacy Regulation Frameworks
We aim at providing artificial agents with logical tools to reason specifically on privacy-related regulations, in order to comply with them. In order to express these regulatio...
Guillaume Piolle, Yves Demazeau
144
Voted
AB
2008
Springer
15 years 9 months ago
Neural Algebra and Consciousness: A Theory of Structural Functionality in Neural Nets
Abstract. Thoughts are spatio-temporal patterns of coalitions of firing neurons and their interconnections. Neural algebras represent these patterns as formal algebraic objects, a...
Erwin Engeler