Sciweavers

1576 search results - page 245 / 316
» Streaming Algorithms for Independent Sets
Sort
View
161
Voted
PR
2010
141views more  PR 2010»
14 years 8 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...
ICASSP
2011
IEEE
14 years 5 months ago
SSIM-inspired image denoising using sparse representations
Perceptual image quality assessment (IQA) and sparse signal representation have recently emerged as high-impact research topics in the field of image processing. Here we make one...
Abdul Rehman, Zhou Wang, Dominique Brunet, Edward ...
112
Voted
WWW
2008
ACM
16 years 2 months ago
Enhanced hierarchical classification via isotonic smoothing
Hierarchical topic taxonomies have proliferated on the World Wide Web [5, 18], and exploiting the output space decompositions they induce in automated classification systems is an...
Kunal Punera, Joydeep Ghosh
VLDB
2009
ACM
130views Database» more  VLDB 2009»
16 years 2 months ago
Multi-dimensional top-k dominating queries
Abstract The top-k dominating query returns k data objects which dominate the highest number of objects in a dataset. This query is an important tool for decision support since it ...
Man Lung Yiu, Nikos Mamoulis
107
Voted
ALT
2008
Springer
15 years 11 months ago
Optimally Learning Social Networks with Activations and Suppressions
In this paper we consider the problem of learning hidden independent cascade social networks using exact value injection queries. These queries involve activating and suppressing a...
Dana Angluin, James Aspnes, Lev Reyzin