Sciweavers

3096 search results - page 31 / 620
» Theory and Use of the EM Algorithm
Sort
View
EMS
2008
IEEE
15 years 3 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
NIPS
2003
15 years 2 months ago
The IM Algorithm: A Variational Approach to Information Maximization
The maximisation of information transmission over noisy channels is a common, albeit generally computationally difficult problem. We approach the difficulty of computing the mutua...
David Barber, Felix V. Agakov
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
15 years 5 months ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter
CLEF
2009
Springer
15 years 2 months ago
Unsupervised Word Decomposition with the Promodes Algorithm
We present Promodes, an algorithm for unsupervised word decomposition, which is based on a probabilistic generative model. The model considers segment boundaries as hidden variable...
Sebastian Spiegler, Bruno Golénia, Peter A....
MICCAI
2005
Springer
16 years 2 months ago
Tissue Classification of Noisy MR Brain Images Using Constrained GMM
We present an automated algorithm for tissue segmentation of noisy, low contrast magnetic resonance (MR) images of the brain. We use a mixture model composed of a large number of G...
Amit Ruf, Hayit Greenspan, Jacob Goldberger