Sciweavers

957 search results - page 66 / 192
» Addition Chain Heuristics
Sort
View
ICIP
2004
IEEE
14 years 11 months ago
Progressive protection of jpeg2000 codestreams
This paper presents an authentication scheme and an access control scheme for JPEG2000 image codestreams based on hash chains. Both schemes are fully compatible with the core part...
Yongdong Wu, Di Ma, Robert H. Deng
ICML
2009
IEEE
14 years 11 months ago
Archipelago: nonparametric Bayesian semi-supervised learning
Semi-supervised learning (SSL), is classification where additional unlabeled data can be used to improve accuracy. Generative approaches are appealing in this situation, as a mode...
Ryan Prescott Adams, Zoubin Ghahramani
ICML
2007
IEEE
14 years 11 months ago
Most likely heteroscedastic Gaussian process regression
This paper presents a novel Gaussian process (GP) approach to regression with inputdependent noise rates. We follow Goldberg et al.'s approach and model the noise variance us...
Kristian Kersting, Christian Plagemann, Patrick Pf...
ICSE
2009
IEEE-ACM
14 years 11 months ago
FEATUREHOUSE: Language-independent, automated software composition
Superimposition is a composition technique that has been applied successfully in many areas of software development. Although superimposition is a general-purpose concept, it has ...
Christian Kästner, Christian Lengauer, Sven A...
DCC
2010
IEEE
14 years 5 months ago
An MCMC Approach to Lossy Compression of Continuous Sources
Motivated by the Markov chain Monte Carlo (MCMC) relaxation method of Jalali and Weissman, we propose a lossy compression algorithm for continuous amplitude sources that relies on...
Dror Baron, Tsachy Weissman