Sciweavers

1659 search results - page 19 / 332
» From Functional Analysis to Iterative Methods
Sort
View
ASIACRYPT
2006
Springer
13 years 11 months ago
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yu...
FUZZIEEE
2007
IEEE
14 years 2 months ago
A Feature Selection Method Based on Choquet Integral and Typicality Analysis
— An iterative feature selection method based on feature typicality and interactivity analysis is presented in this paper. The aim is to enhance model interpretability by selecti...
Cyril Mazaud, Jan Rendek, Vincent Bombardier, Laur...
ICASSP
2011
IEEE
12 years 11 months ago
An efficient peak frequency estimator for product high-order ambiguity function
In this paper, we consider improvement of parameter estimation accuracy of multicomponent polynomial-phase signals (mc-PPSs) using the product high-order ambiguity function (PHAF)...
Slobodan Djukanovic, Vesna Popovic
JMLR
2008
129views more  JMLR 2008»
13 years 7 months ago
Finite-Time Bounds for Fitted Value Iteration
In this paper we develop a theoretical analysis of the performance of sampling-based fitted value iteration (FVI) to solve infinite state-space, discounted-reward Markovian decisi...
Rémi Munos, Csaba Szepesvári
ACMDIS
2004
ACM
14 years 1 months ago
Making tea: iterative design through analogy
The success of translating an analog or manual practice into a digital interactive system may depend on how well that translation captures not only the functional what and how asp...
Monica M. C. Schraefel, Gareth V. Hughes, Hugo R. ...