Sciweavers

285 search results - page 46 / 57
» A fuzzy random forest
Sort
View
IISWC
2008
IEEE
15 years 10 months ago
Energy-aware application scheduling on a heterogeneous multi-core system
Heterogeneous multi-core processors are attractive for power efficient computing because of their ability to meet varied resource requirements of diverse applications in a workloa...
Jian Chen, Lizy Kurian John
FSKD
2008
Springer
174views Fuzzy Logic» more  FSKD 2008»
15 years 5 months ago
A Hybrid Re-sampling Method for SVM Learning from Imbalanced Data Sets
Support Vector Machine (SVM) has been widely studied and shown success in many application fields. However, the performance of SVM drops significantly when it is applied to the pr...
Peng Li, Pei-Li Qiao, Yuan-Chao Liu
FUIN
2008
108views more  FUIN 2008»
15 years 4 months ago
Radial View of Continuous Cellular Automata
Continuous cellular automata (or coupled map lattices) are cellular automata where the state of the cells are real values in [0, 1] and the local transition rule is a real function...
Paola Flocchini, Vladimir Cezar
150
Voted
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
16 years 4 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 4 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs