Sciweavers

2520 search results - page 194 / 504
» The complexity of approximating entropy
Sort
View
ISCAS
2003
IEEE
116views Hardware» more  ISCAS 2003»
15 years 4 months ago
Effective hardware-oriented technique for the rate control of JPEG2000 encoding
A great deal of computation for JPEG2000 encoding is a redundancy when the compression rate is high. That is because many coded bit-streams will be truncated after the rate contro...
Te-Hao Chang, Chung-Jr Lian, Hong-Hui Chen, Jing-Y...
MMMACNS
2001
Springer
15 years 3 months ago
Generalized Oblivious Transfer Protocols Based on Noisy Channels
The main cryptographic primitives (Bit Commitment (BC) and Oblivious Transfer (OT) protocols) based on noisy channels have been considered in [1] for asymptotic case. Non-asymptoti...
Valeri Korjik, Kirill Morozov
COLT
2000
Springer
15 years 3 months ago
Model Selection and Error Estimation
We study model selection strategies based on penalized empirical loss minimization. We point out a tight relationship between error estimation and data-based complexity penalizatio...
Peter L. Bartlett, Stéphane Boucheron, G&aa...
SOUPS
2010
ACM
15 years 3 months ago
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
102
Voted
CICLING
2010
Springer
15 years 2 months ago
ETL Ensembles for Chunking, NER and SRL
We present a new ensemble method that uses Entropy Guided Transformation Learning (ETL) as the base learner. The proposed approach, ETL Committee, combines the main ideas of Baggin...
Cícero Nogueira dos Santos, Ruy Luiz Milidi...