Sciweavers

12183 search results - page 2425 / 2437
» Computers under Attacks!
Sort
View
ML
2010
ACM
163views Machine Learning» more  ML 2010»
13 years 3 months ago
Classification with guaranteed probability of error
We introduce a general-purpose learning machine that we call the Guaranteed Error Machine, or GEM, and two learning algorithms, a real GEM algorithm and an ideal GEM algorithm. Th...
Marco C. Campi
PAMI
2010
273views more  PAMI 2010»
13 years 3 months ago
Correspondence-Free Activity Analysis and Scene Modeling in Multiple Camera Views
We propose a novel approach for activity analysis in multiple synchronized but uncalibrated static camera views. In this paper, we refer to activities as motion patterns of objects...
Xiaogang Wang, Kinh Tieu, W. Eric L. Grimson
SIAMIS
2010
141views more  SIAMIS 2010»
13 years 3 months ago
Optimization by Stochastic Continuation
Simulated annealing (SA) and deterministic continuation are well-known generic approaches to global optimization. Deterministic continuation is computationally attractive but produ...
Marc C. Robini, Isabelle E. Magnin
SIAMJO
2010
155views more  SIAMJO 2010»
13 years 3 months ago
Optimal Portfolio Execution Strategies and Sensitivity to Price Impact Parameters
When liquidating a portfolio of large blocks of risky assets, an institutional investor wants to minimize the cost as well as the risk of execution. An optimal execution strategy ...
Somayeh Moazeni, Thomas F. Coleman, Yuying Li
SIAMMAX
2010
164views more  SIAMMAX 2010»
13 years 3 months ago
Uniqueness of Low-Rank Matrix Completion by Rigidity Theory
The problem of completing a low-rank matrix from a subset of its entries is often encountered in the analysis of incomplete data sets exhibiting an underlying factor model with app...
Amit Singer, Mihai Cucuringu
« Prev « First page 2425 / 2437 Last » Next »