Sciweavers

1037 search results - page 78 / 208
» Topic Models Conditioned on Relations
Sort
View
UTP
2010
14 years 7 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
4OR
2008
79views more  4OR 2008»
14 years 10 months ago
MIP-based heuristic for non-standard 3D-packing problems
This paper is the continuation of a previous work (Fasano 2004), dedicated to a MIP formulation for non-standard three-dimensional packing issues, with additional conditions. The ...
Giorgio Fasano
IBERAMIA
2010
Springer
14 years 8 months ago
A Visual Grammar for Face Detection
Several methods have been developed for face detection with certain success, however these tend to fail under difficult conditions such as partial occlusions and changes in orienta...
Augusto Meléndez, Luis Enrique Sucar, Eduar...
ICML
2008
IEEE
15 years 10 months ago
Fully distributed EM for very large datasets
In EM and related algorithms, E-step computations distribute easily, because data items are independent given parameters. For very large data sets, however, even storing all of th...
Jason Wolfe, Aria Haghighi, Dan Klein
ICML
2000
IEEE
15 years 10 months ago
Learning to Create Customized Authority Lists
The proliferation of hypertext and the popularity of Kleinberg's HITS algorithm have brought about an increased interest in link analysis. While HITS and its older relatives ...
Huan Chang, David Cohn, Andrew McCallum