Sciweavers

41 search results - page 5 / 9
» Can faces verify blood-relations
Sort
View
ICWL
2007
Springer
14 years 1 months ago
Discovery of Educational Objective on E-Learning Resource: A Competency Approach
It is indeed important to implement e-Learning platforms for education and training purposes in a variety of domains. However, facing the enormous amount of learning resources, gui...
Shi-Ming Huang, Hsiang-Yuan Hsueh, Jing-Shiuan Hua
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 6 months ago
Random Projections for $k$-means Clustering
This paper discusses the topic of dimensionality reduction for k-means clustering. We prove that any set of n points in d dimensions (rows in a matrix A ∈ Rn×d ) can be project...
Christos Boutsidis, Anastasios Zouzias, Petros Dri...
LREC
2008
131views Education» more  LREC 2008»
13 years 9 months ago
Chinese Term Extraction Based on Delimiters
Existing techniques extract term candidates by looking for internal and contextual information associated with domain specific terms. The algorithms always face the dilemma that f...
Yuhang Yang, Qin Lu, Tiejun Zhao
IPPS
2007
IEEE
14 years 1 months ago
Stack Trace Analysis for Large Scale Debugging
We present the Stack Trace Analysis Tool (STAT) to aid in debugging extreme-scale applications. STAT can reduce problem exploration spaces from thousands of processes to a few by ...
Dorian C. Arnold, Dong H. Ahn, Bronis R. de Supins...
ACNS
2009
Springer
121views Cryptology» more  ACNS 2009»
13 years 11 months ago
Efficient Deniable Authentication for Signatures
Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicio...
Jean Monnerat, Sylvain Pasini, Serge Vaudenay