Sciweavers

7015 search results - page 1215 / 1403
» Approximation algorithms for co-clustering
Sort
View
134
Voted
FOCI
2007
IEEE
15 years 10 months ago
Almost All Learning Machines are Singular
— A learning machine is called singular if its Fisher information matrix is singular. Almost all learning machines used in information processing are singular, for example, layer...
Sumio Watanabe
211
Voted
FOCS
2007
IEEE
15 years 10 months ago
Mechanism Design via Differential Privacy
We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic age...
Frank McSherry, Kunal Talwar
HICSS
2007
IEEE
138views Biometrics» more  HICSS 2007»
15 years 10 months ago
A Probabilistic Graphical Approach to Computing Electricity Price Duration Curves under Price and Quantity Competition
Abstract— The electricity price duration curve (EPDC) represents the probability distribution function of the electricity price considered as a random variable. The price uncerta...
Pascal Michaillat, Shmuel S. Oren
146
Voted
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 10 months ago
Accurate Classification of the Internet Traffic Based on the SVM Method
—The need to quickly and accurately classify Internet traffic for security and QoS control has been increasing significantly with the growing Internet traffic and applications ov...
Zhu Li, Ruixi Yuan, Xiaohong Guan
127
Voted
ICC
2007
IEEE
203views Communications» more  ICC 2007»
15 years 10 months ago
Distributed Data Aggregation Using Clustered Slepian-Wolf Coding in Wireless Sensor Networks
—Slepian-Wolf coding is a promising distributed source coding technique that can completely remove the data redundancy caused by the spatially correlated observations in wireless...
Pu Wang, Cheng Li, Jun Zheng
« Prev « First page 1215 / 1403 Last » Next »