Sciweavers

123 search results - page 16 / 25
» Domain Consistency with Forbidden Values
Sort
View
ICML
2003
IEEE
14 years 10 months ago
Online Convex Programming and Generalized Infinitesimal Gradient Ascent
Convex programming involves a convex set F Rn and a convex cost function c : F R. The goal of convex programming is to find a point in F which minimizes c. In online convex prog...
Martin Zinkevich
ICB
2009
Springer
202views Biometrics» more  ICB 2009»
14 years 4 months ago
Beyond Minutiae: A Fingerprint Individuality Model with Pattern, Ridge and Pore Features
Abstract. Fingerprints are considered to be unique because they contain various distinctive features, including minutiae, ridges, pores, etc. Some attempts have been made to model ...
Yi Chen, Anil K. Jain
ISMIS
2009
Springer
14 years 4 months ago
Discovering Relevant Cross-Graph Cliques in Dynamic Networks
Abstract. Several algorithms, namely CubeMiner, Trias, and DataPeeler, have been recently proposed to mine closed patterns in ternary relations. We consider here the specific cont...
Loïc Cerf, Tran Bao Nhan Nguyen, Jean-Fran&cc...
ICASSP
2008
IEEE
14 years 4 months ago
Blind estimation of reverberation time based on the distribution of signal decay rates
The reverberation time is one of the most prominent acoustic characteristics of an enclosure. Its value can be used to predict speech intelligibility, and is used by speech enhanc...
Jimi Y. C. Wen, Emanuel A. P. Habets, Patrick A. N...
DASFAA
2007
IEEE
134views Database» more  DASFAA 2007»
14 years 4 months ago
Eliciting Matters - Controlling Skyline Sizes by Incremental Integration of User Preferences
Today, result sets of skyline queries are unmanageable due to their exponential growth with the number of query predicates. In this paper we discuss the incremental re-computation ...
Wolf-Tilo Balke, Ulrich Güntzer, Christoph Lo...