Sciweavers

2652 search results - page 165 / 531
» Privacy-preserving linear programming
Sort
View
ICML
2003
IEEE
16 years 4 months ago
Marginalized Kernels Between Labeled Graphs
A new kernel function between two labeled graphs is presented. Feature vectors are defined as the counts of label paths produced by random walks on graphs. The kernel computation ...
Hisashi Kashima, Koji Tsuda, Akihiro Inokuchi
213
Voted
CP
2009
Springer
16 years 4 months ago
Restricted Global Grammar Constraints
We investigate the global GRAMMAR constraint over restricted classes of context free grammars like deterministic and unambiguous context-free grammars. We show that detecting disen...
George Katsirelos, Sebastian Maneth, Nina Narodyts...
SAC
2004
ACM
15 years 8 months ago
Frequent free tree discovery in graph data
In recent years, researchers in graph mining have been exploring linear paths as well as subgraphs as pattern languages. In this paper, we are investigating the middle ground betw...
Ulrich Rückert, Stefan Kramer
HYBRID
2000
Springer
15 years 7 months ago
Controlled Invariance of Discrete Time Systems
Abstract. An algorithm for computing the maximal controlled invariant set and the least restrictive controller for discrete time systems is proposed. We show how the algorithm can ...
René Vidal, Shawn Schaffert, John Lygeros, ...
132
Voted
NIPS
2000
15 years 4 months ago
Active Support Vector Machine Classification
An active set strategy is applied to the dual of a simple reformulation of the standard quadratic program of a linear support vector machine. This application generates a fast new...
Olvi L. Mangasarian, David R. Musicant