Sciweavers

5344 search results - page 396 / 1069
» Privacy-Preserving Set Operations
Sort
View
172
Voted

Publication
336views
15 years 10 months ago
A Discriminative approach for Wavelet Shrinkage Denoising
This paper suggests a discriminative approach for wavelet denoising where a set of mapping functions (MF) are applied to the transform coefficients in an attempt to produce a noi...
Yacov Hel-Or and Doron Shaked
CW
2002
IEEE
15 years 10 months ago
Direct Segmentation for Reverse Engineering
In Reverse Engineering a physical object is digitally reconstructed from a set of boundary points. In the segmentation phase these points are grouped into subsets to facilitate co...
Marek Vanco, Guido Brunnett
137
Voted
ESOP
2001
Springer
15 years 9 months ago
The Def-inite Approach to Dependency Analysis
Abstract. We propose a new representation for the domain of Definite Boolean functions. The key idea is to view the set of models of a Boolean function as an incidence relation be...
Samir Genaim, Michael Codish
EH
2000
IEEE
81views Hardware» more  EH 2000»
15 years 9 months ago
Toward Self-Repairing and Self-Replicating Hardware: The Embryonics Approach
The growth and operation of all living beings are directed by the interpretation, in each of their cells, of a chemical program, the DNA string or genome. This process is the sour...
Daniel Mange, Moshe Sipper, André Stauffer,...
EUROCOLT
1999
Springer
15 years 9 months ago
Regularized Principal Manifolds
Many settings of unsupervised learning can be viewed as quantization problems — the minimization of the expected quantization error subject to some restrictions. This allows the ...
Alex J. Smola, Robert C. Williamson, Sebastian Mik...