Sciweavers

1760 search results - page 49 / 352
» Connected Set Cover Problem and Its Applications
Sort
View
JMM
2007
107views more  JMM 2007»
13 years 7 months ago
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wi...
Rene Mayrhofer, Roswitha Gostner
JMLR
2006
93views more  JMLR 2006»
13 years 7 months ago
An Efficient Implementation of an Active Set Method for SVMs
We propose an active set algorithm to solve the convex quadratic programming (QP) problem which is the core of the support vector machine (SVM) training. The underlying method is ...
Katya Scheinberg
FOCS
2004
IEEE
13 years 11 months ago
Worst-Case to Average-Case Reductions Based on Gaussian Measures
We show that finding small solutions to random modular linear equations is at least as hard as approximating several lattice problems in the worst case within a factor almost line...
Daniele Micciancio, Oded Regev
SDM
2007
SIAM
120views Data Mining» more  SDM 2007»
13 years 9 months ago
An Analysis of Logistic Models: Exponential Family Connections and Online Performance
Logistic models are arguably one of the most widely used data analysis techniques. In this paper, we present analyses focussing on two important aspects of logistic models—its r...
Arindam Banerjee
FSTTCS
2008
Springer
13 years 8 months ago
Pruning 2-Connected Graphs
Given an edge-weighted undirected graph G with a specified set of terminals, let the density of any subgraph be the ratio of its weight/cost to the number of terminals it contain...
Chandra Chekuri, Nitish Korula