Sciweavers

1042 search results - page 155 / 209
» Failing First: An Update
Sort
View
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
13 years 7 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
PKDD
2010
Springer
169views Data Mining» more  PKDD 2010»
13 years 7 months ago
Efficient and Numerically Stable Sparse Learning
We consider the problem of numerical stability and model density growth when training a sparse linear model from massive data. We focus on scalable algorithms that optimize certain...
Sihong Xie, Wei Fan, Olivier Verscheure, Jiangtao ...
ACIIDS
2009
IEEE
159views Database» more  ACIIDS 2009»
13 years 7 months ago
Application to GA-Based Fuzzy Control for Nonlinear Systems with Uncertainty
In this study, we strive to combine the advantages of fuzzy theory, genetic algorithms (GA), H tracking control schemes, smooth control and adaptive laws to design an adaptive fuzz...
Po-Chen Chen, Ken Yeh, Cheng-Wu Chen, Chen-Yuan Ch...
HVEI
2009
13 years 7 months ago
Color rendering indices in global illumination methods
Human perception of material colors depends heavily on the nature of the light sources that are used for illumination. One and the same object can cause highly different color impr...
David Geisler-Moroder, Arne Dür
ICDM
2009
IEEE
133views Data Mining» more  ICDM 2009»
13 years 7 months ago
Clustering Trajectories of Moving Objects in an Uncertain World
Mining Trajectory Databases (TD) has recently gained great interest due to the popularity of tracking devices. On the other hand, the inherent presence of uncertainty in TD (e.g.,...
Nikos Pelekis, Ioannis Kopanakis, Evangelos E. Kot...