Sciweavers

288 search results - page 34 / 58
» Estimating the maximum information leakage
Sort
View
ICIP
2000
IEEE
14 years 9 months ago
Hierarchical Image Probability (HIP) Models
We formulate a model for probability distributions on image spaces. We show that any distribution of images can be factored exactly into conditional distributions of feature vecto...
Clay Spence, Lucas C. Parra, Paul Sajda
NIPS
2007
13 years 9 months ago
Expectation Maximization and Posterior Constraints
The expectation maximization (EM) algorithm is a widely used maximum likelihood estimation procedure for statistical models when the values of some of the variables in the model a...
João Graça, Kuzman Ganchev, Ben Task...
NAACL
2007
13 years 9 months ago
Unsupervised Resolution of Objects and Relations on the Web
The task of identifying synonymous relations and objects, or Synonym Resolution (SR), is critical for high-quality information extraction. The bulk of previous SR work assumed str...
Alexander Yates, Oren Etzioni
CCS
2007
ACM
14 years 1 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
BMCBI
2005
89views more  BMCBI 2005»
13 years 7 months ago
An empirical analysis of training protocols for probabilistic gene finders
Background: Generalized hidden Markov models (GHMMs) appear to be approaching acceptance as a de facto standard for state-of-the-art ab initio gene finding, as evidenced by the re...
William H. Majoros, Steven Salzberg