Sciweavers

329 search results - page 48 / 66
» Setting up Exhausted Values
Sort
View
JMLR
2006
150views more  JMLR 2006»
14 years 9 months ago
Exact 1-Norm Support Vector Machines Via Unconstrained Convex Differentiable Minimization
Support vector machines utilizing the 1-norm, typically set up as linear programs (Mangasarian, 2000; Bradley and Mangasarian, 1998), are formulated here as a completely unconstra...
Olvi L. Mangasarian
TMI
2008
84views more  TMI 2008»
14 years 9 months ago
Optimal Wavelet Transform for the Detection of Microaneurysms in Retina Photographs
In this article, we propose an automatic method to detect microaneurysms in retina photographs. Microaneurysms are the most frequent and usually the first lesions to appear as a co...
Gwénolé Quellec, Mathieu Lamard, P. ...
VC
2008
190views more  VC 2008»
14 years 9 months ago
Fast collision detection using the A-buffer
This paper presents a novel and fast image-space collision detection algorithm with the A-buffer, where the GPU computes the potentially colliding sets (PCSs), and the CPU performs...
Han-Young Jang, JungHyun Han
TCAD
1998
127views more  TCAD 1998»
14 years 9 months ago
Gate-level power estimation using tagged probabilistic simulation
In this paper, we present a probabilistic simulation technique to estimate the power consumption of a cmos circuit under a general delay model. This technique is based on the noti...
Chih-Shun Ding, Chi-Ying Tsui, Massoud Pedram
IJISEC
2010
159views more  IJISEC 2010»
14 years 7 months ago
A generalization of Paillier's public-key system with applications to electronic voting
We propose a generalization of Paillier's probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme e...
Ivan Damgård, Mads Jurik, Jesper Buus Nielse...