Sciweavers

1127 search results - page 202 / 226
» Theory Extension in ACL2(r)
Sort
View
CIMAGING
2010
133views Hardware» more  CIMAGING 2010»
15 years 2 months ago
Motion blur removal in nonlinear sensors
We address the problem of motion blur removal from an image sequence that was acquired by a sensor with nonlinear response. Motion blur removal in purely linear settings has been ...
Tomer Faktor, Tomer Michaeli, Yonina C. Eldar
97
Voted
COMAD
2008
15 years 2 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
NIPS
2007
15 years 2 months ago
Discriminative K-means for Clustering
We present a theoretical study on the discriminative clustering framework, recently proposed for simultaneous subspace selection via linear discriminant analysis (LDA) and cluster...
Jieping Ye, Zheng Zhao, Mingrui Wu
SODA
2008
ACM
77views Algorithms» more  SODA 2008»
15 years 2 months ago
Online make-to-order joint replenishment model: primal dual competitive algorithms
In this paper, we study an online make-to-order variant of the classical joint replenishment problem (JRP) that has been studied extensively over the years and plays a fundamental...
Niv Buchbinder, Tracy Kimbrel, Retsef Levi, Konsta...
66
Voted
ECIS
2004
15 years 2 months ago
What should the business know about information systems?
This paper presents an exploratory study of Information Systems (IS) competencies of business managers in Europe. Following resource-based theory and a knowledge-based view of IS ...
Salvador Aragon, Ryan R. Peterson