Sciweavers

2497 search results - page 332 / 500
» Requirements for models of achievable routing
Sort
View
AICT
2010
IEEE
240views Communications» more  AICT 2010»
14 years 5 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
EMNLP
2011
14 years 1 months ago
Training a Log-Linear Parser with Loss Functions via Softmax-Margin
Log-linear parsing models are often trained by optimizing likelihood, but we would prefer to optimise for a task-specific metric like Fmeasure. Softmax-margin is a convex objecti...
Michael Auli, Adam Lopez
CVPR
2012
IEEE
13 years 4 months ago
Capturing relightable images using computer monitors
Image based relighting techniques are a popular choice for generating photo-realistic images of objects under any lighting condition. A typical process for creating such a model i...
Prabath Gunawardane, Steven Scher, James Davis
WSDM
2010
ACM
214views Data Mining» more  WSDM 2010»
15 years 11 months ago
Pairwise Interaction Tensor Factorization for Personalized Tag Recommendation
Tagging plays an important role in many recent websites. Recommender systems can help to suggest a user the tags he might want to use for tagging a specific item. Factorization mo...
Steffen Rendle, Lars Schmidt-Thieme
WSDM
2012
ACM
259views Data Mining» more  WSDM 2012»
13 years 9 months ago
Learning recommender systems with adaptive regularization
Many factorization models like matrix or tensor factorization have been proposed for the important application of recommender systems. The success of such factorization models dep...
Steffen Rendle