Sciweavers

12148 search results - page 2340 / 2430
» Generalized Bundle Methods
Sort
View
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 11 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
MVA
2007
230views Computer Vision» more  MVA 2007»
13 years 11 months ago
A Rear Vehicle Location Algorithm for Lane Change Assist
A monocular vision based location algorithm is presented to detect and track rear vehicles for lane change assist. The algorithm uses the shadow underneath the vehicle to extract ...
Wei Liu, Chunyan Song, Pengyu Fu, Nan Wang, Huai Y...
APBC
2004
123views Bioinformatics» more  APBC 2004»
13 years 11 months ago
Empirical Knowledge and Genetic Algorithms for Selection of Amide I Frequencies in Protein Secondary Structure Prediction
Here we investigate an extension of a previously suggested "automatic amide I frequency selection procedure" where we introduce an additional criterion utilizing empiric...
Joachim A. Hering, Peter R. Innocent, Parvez I. Ha...
CAINE
2006
13 years 11 months ago
A multiobjective evolutionary approach for constrained joint source code optimization
The synergy of software and hardware leads to efficient application expression profile (AEP) not only in terms of execution time and energy but also optimal architecture usage. We...
Naeem Zafar Azeemi
ECIS
2004
13 years 11 months ago
Leveraging Theoretical Pluralism in qualitative IS research: The example of IS professionals' identity as a complex phenomenon
As Information Systems (IS) research increasingly acknowledges the importance of non-positivist approaches, the case for a plurality of theories to guide qualitative studies has g...
Jo-Ann Siregar, Michael T. K. Tan
« Prev « First page 2340 / 2430 Last » Next »