Sciweavers

1403 search results - page 125 / 281
» About Approximations of Exponentials
Sort
View
CIKM
2009
Springer
15 years 11 months ago
A general magnitude-preserving boosting algorithm for search ranking
Traditional boosting algorithms for the ranking problems usually employ the pairwise approach and convert the document rating preference into a binary-value label, like RankBoost....
Chenguang Zhu, Weizhu Chen, Zeyuan Allen Zhu, Gang...
COCO
2009
Springer
128views Algorithms» more  COCO 2009»
15 years 11 months ago
An Almost Optimal Rank Bound for Depth-3 Identities
—We show that the rank of a depth-3 circuit (over any field) that is simple, minimal and zero is at most O(k3 log d). The previous best rank bound known was 2O(k2 ) (log d)k−2...
Nitin Saxena, C. Seshadhri
FC
2009
Springer
118views Cryptology» more  FC 2009»
15 years 11 months ago
Cryptographic Combinatorial Clock-Proxy Auctions
We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trust...
David C. Parkes, Michael O. Rabin, Christopher Tho...
160
Voted
MKM
2009
Springer
15 years 11 months ago
Combined Decision Techniques for the Existential Theory of the Reals
Methods for deciding quantifier-free non-linear arithmetical conjectures over R are crucial in the formal verification of many realworld systems and in formalised mathematics. Wh...
Grant Olney Passmore, Paul B. Jackson
141
Voted
HAPTICS
2008
IEEE
15 years 11 months ago
Using Vibration Patterns to Provide Impact Position Information in Haptic Manipulation of Virtual Objects
While standard closed haptic control loop used in haptic simulation of rigid bodies are bounded to low frequency force restitution, event-based or open-loop haptic, by superimposin...
Jean Sreng, Anatole Lécuyer, Claude Andriot