Sciweavers

2560 search results - page 45 / 512
» Contributions to zero-sum problems
Sort
View
CVPR
2011
IEEE
13 years 3 months ago
A Closed Form Solution to Robust Subspace Estimation and Clustering
We consider the problem of fitting one or more subspaces to a collection of data points drawn from the subspaces and corrupted by noise/outliers. We pose this problem as a rank m...
Paolo Favaro, René, Vidal, Avinash Ravichandran

Publication
200views
12 years 3 months ago
Learning Tags from Unsegmented Videos of Multiple Human Actions
Providing methods to support semantic interaction with growing volumes of video data is an increasingly important challenge for data mining. To this end, there has been some succes...
Timothy Hospedales, Shaogang Gong, Tao Xiang
PKC
2012
Springer
279views Cryptology» more  PKC 2012»
11 years 10 months ago
Circular and KDM Security for Identity-Based Encryption
We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (I...
Jacob Alperin-Sheriff, Chris Peikert
AAAI
2012
11 years 10 months ago
Learning Behavior Models for Hybrid Timed Systems
A tailored model of a system is the prerequisite for various analysis tasks, such as anomaly detection, fault identification, or quality assurance. This paper deals with the algo...
Oliver Niggemann, Benno Stein, Asmir Vodencarevic,...
SIGMOD
2005
ACM
153views Database» more  SIGMOD 2005»
14 years 8 months ago
Multiple Aggregations Over Data Streams
Monitoring aggregates on IP traffic data streams is a compelling application for data stream management systems. The need for exploratory IP traffic data analysis naturally leads ...
Rui Zhang 0003, Nick Koudas, Beng Chin Ooi, Divesh...