Sciweavers

251 search results - page 48 / 51
» When Size Does Matter
Sort
View
NIPS
2003
15 years 1 months ago
Boosting versus Covering
We investigate improvements of AdaBoost that can exploit the fact that the weak hypotheses are one-sided, i.e. either all its positive (or negative) predictions are correct. In pa...
Kohei Hatano, Manfred K. Warmuth
119
Voted
SIMVIS
2003
15 years 1 months ago
An Experimental Study of the Behaviour of the Proxel-Based Simulation Algorithm
The paradigm of the proxel ("probability element") was recently introduced in order to provide a new algorithmic approach to analysing discrete-state stochastic models s...
Sanja Lazarova-Molnar, Graham Horton
USENIX
1990
15 years 1 months ago
swm: An X Window Manager Shell
swm is a policy-free, user configurable window manager client for the X Window System. Besides providing basic window manager functionality, swm introduces new features not found ...
Thomas E. LaStrange
CORR
2010
Springer
84views Education» more  CORR 2010»
15 years 17 days ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
87
Voted
CORR
2010
Springer
121views Education» more  CORR 2010»
15 years 17 days ago
Symmetric Allocations for Distributed Storage
We consider the problem of optimally allocating a given total storage budget in a distributed storage system. A source has a data object which it can code and store over a set of s...
Derek Leong, Alexandros G. Dimakis, Tracey Ho