Sciweavers

1585 search results - page 78 / 317
» Automatically optimizing secure computation
Sort
View
GECCO
2007
Springer
144views Optimization» more  GECCO 2007»
13 years 11 months ago
The reliability of confidence intervals for computational effort comparisons
This paper analyses the reliability of confidence intervals for Koza's computational effort statistic. First, we conclude that dependence between the observed minimum generat...
Matthew Walker, Howard Edwards, Chris H. Messom
PG
1999
IEEE
14 years 6 days ago
Automatic Creation of Object Hierarchies for Radiosity Clustering
Using object clusters for hierarchical radiosity greatly improves the efficiency and thus usability of radiosity computations. By eliminating the quadratic starting phase very lar...
Gordon Müller, Stephan Schäfer, Dieter W...
ICPR
2008
IEEE
14 years 9 months ago
MDL patch correspondences on unlabeled images
Automatic construction of Shape and Appearance Models from examples via establishing correspondences across the training set has been successful in the last decades. One successfu...
Johan Karlsson, Kalle Åström
CCS
2009
ACM
14 years 2 months ago
A framework for quantitative security analysis of machine learning
We propose a framework for quantitative security analysis of machine learning methods. Key issus of this framework are a formal specification of the deployed learning model and a...
Pavel Laskov, Marius Kloft
EUROGRAPHICS
2010
Eurographics
14 years 5 months ago
Optimizing Photo Composition
Aesthetic images evoke an emotional response that transcends mere visual appreciation. In this work we develop a novel computational means for evaluating the composition aesthetic...
Ligang G. Liu, Renjie J. Chen, Lior Wolf, Daniel C...