Sciweavers

50 search results - page 3 / 10
» Analysis of Basis Pursuit Via Capacity Sets
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 7 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
PKDD
2009
Springer
118views Data Mining» more  PKDD 2009»
14 years 1 months ago
Sparse Kernel SVMs via Cutting-Plane Training
We explore an algorithm for training SVMs with Kernels that can represent the learned rule using arbitrary basis vectors, not just the support vectors (SVs) from the training set. ...
Thorsten Joachims, Chun-Nam John Yu
CORR
2010
Springer
207views Education» more  CORR 2010»
13 years 7 months ago
Collaborative Hierarchical Sparse Modeling
Sparse modeling is a powerful framework for data analysis and processing. Traditionally, encoding in this framework is performed by solving an 1-regularized linear regression prob...
Pablo Sprechmann, Ignacio Ramírez, Guillerm...
SIGMETRICS
2000
ACM
107views Hardware» more  SIGMETRICS 2000»
13 years 11 months ago
Detecting shared congestion of flows via end-to-end measurement
Current Internet congestion control protocols operate independently on a per-flow basis. Recent work has demonstrated that cooperative congestion control strategies between flow...
Dan Rubenstein, James F. Kurose, Donald F. Towsley
ACL
1996
13 years 8 months ago
From Submit to Submitted via Submission: On Lexical Rules in Large-Scale Lexicon Acquisition
This paper deals with the discovery, representation, and use of lexical rules (LRs) during large-scale semi-automatic computational lexicon acquisition. The analysis is based on a...
Evelyne Viegas, Boyan A. Onyshkevych, Victor Raski...