Sciweavers

1297 search results - page 11 / 260
» fews 2007
Sort
View
NIPS
2000
15 years 1 months ago
Kernel Expansions with Unlabeled Examples
Modern classification applications necessitate supplementing the few available labeled examples with unlabeled examples to improve classification performance. We present a new tra...
Martin Szummer, Tommi Jaakkola
AMC
2005
112views more  AMC 2005»
14 years 11 months ago
Stieltjes moment problem via fractional moments
Stieltjes moment problem is considered to recover a probability density function from the knowledge of its infinite sequence of ordinary moments. The approximate density is obtain...
Pierluigi Novi Inverardi, Alberto Petri, Giorgio P...
NETWORKING
2007
15 years 1 months ago
Using Auxiliary Sensors for Pairwise Key Establishment in WSN
Abstract. Many techniques have been developed recently for establishing pairwise keys in sensor networks. However, they are either vulnerable to a few number of compromised sensor ...
Qi Dong, Donggang Liu
EMNLP
2007
15 years 1 months ago
Compressing Trigram Language Models With Golomb Coding
Trigram language models are compressed using a Golomb coding method inspired by the original Unix spell program. Compression methods trade off space, time and accuracy (loss). The...
Kenneth Church, Ted Hart, Jianfeng Gao
IJSN
2007
82views more  IJSN 2007»
14 years 11 months ago
Vulnerabilities in distance-indexed IP traceback schemes
: In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years. Among them, distanceindexe...
Jianping Pan, Lin Cai, Xuemin Shen