Sciweavers

152 search results - page 20 / 31
» A Tutorial on the Cross-Entropy Method
Sort
View
FTML
2010
159views more  FTML 2010»
13 years 7 months ago
Dimension Reduction: A Guided Tour
We give a tutorial overview of several geometric methods for dimension reduction. We divide the methods into projective methods and methods that model the manifold on which the da...
Christopher J. C. Burges
ESANN
2000
13 years 9 months ago
Algorithmic approaches to training Support Vector Machines: a survey
: Support Vector Machines (SVMs) have become an increasingly popular tool for machine learning tasks involving classi cation, regression or novelty detection. They exhibit good gen...
Colin Campbell
IWDW
2005
Springer
14 years 1 months ago
The Return of the Sensitivity Attack
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
Pedro Comesaña, Luis Pérez-Freire, F...
BCSHCI
2008
13 years 9 months ago
Provoking creative design: making it scale
Creativity is indispensable for more innovative interactive system development. This tutorial is relevant to anyone involved in large projects that are exploiting new technologies...
Neil A. M. Maiden, Sara Jones
DSD
2006
IEEE
99views Hardware» more  DSD 2006»
14 years 2 days ago
Flexible Bus and NoC Performance Analysis with Configurable Synthetic Workloads
We present a flexible method for bus and network on chip performance analysis, which is based on the adaptation of workload models to resemble various applications. Our analysis m...
Rikard Thid, Ingo Sander, Axel Jantsch