Sciweavers

16518 search results - page 3226 / 3304
» A New Approach to Splitting-Off
Sort
View
KDD
2000
ACM
133views Data Mining» more  KDD 2000»
14 years 2 months ago
Data selection for support vector machine classifiers
The problem of extracting a minimal number of data points from a large dataset, in order to generate a support vector machine (SVM) classifier, is formulated as a concave minimiza...
Glenn Fung, Olvi L. Mangasarian
MFCS
2000
Springer
14 years 2 months ago
On the Use of Duality and Geometry in Layouts for ATM Networks
Abstract. We show how duality properties and geometric considerations are used in studies related to virtual path layouts of ATM networks. We concentrate on the one-to-many problem...
Shmuel Zaks
MICCAI
2000
Springer
14 years 2 months ago
Motion-Based Robotic Instrument Targeting under C-Arm Fluoroscopy
: We present a simple and precise robot targeting method under portable x-ray fluoroscopy based on image servoing. The method is implemented for needle alignment in percutaneous pr...
Alexandru Patriciu, Dan Stoianovici, Louis L. Whit...
PARA
2000
Springer
14 years 2 months ago
Experiments in Separating Computational Algorithm from Program Distribution and Communication
Our proposal has the following key features: 1) The separation of a distributed program into a pure algorithm (PurAl) and a distribution/communication declaration (DUAL). This yie...
Raphael B. Yehezkael, Yair Wiseman, H. G. Mendelba...
EUROCRYPT
1997
Springer
14 years 2 months ago
Oblivious Transfers and Privacy Amplification
Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-two string OT, a sender offers two strings, one of which the other party, called the receive...
Gilles Brassard, Claude Crépeau
« Prev « First page 3226 / 3304 Last » Next »