Sciweavers

708 search results - page 86 / 142
» Improving Mining Quality by Exploiting Data Dependency
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
An extension of the ICA model using latent variables
The Independent Component Analysis (ICA) model is extended to the case where the components are not necessarily independent: depending on the value a hidden latent process at the ...
Selwa Rafi, Marc Castella, Wojciech Pieczynski
MICRO
1999
IEEE
104views Hardware» more  MICRO 1999»
13 years 12 months ago
Control Independence in Trace Processors
Branch mispredictions are a major obstacle to exploiting instruction-level parallelism, at least in part because all instructions after a mispredicted branch are squashed. However...
Eric Rotenberg, James E. Smith
TIP
2010
131views more  TIP 2010»
13 years 2 months ago
Orientation Modulation for Data Hiding in Clustered-Dot Halftone Prints
We present a new framework for data hiding in images printed with clustered dot halftones. Our application scenario, like other hardcopy embedding methods, encounters fundamental c...
Orhan Bulan, Gaurav Sharma, Vishal Monga
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
14 years 4 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
ICMCS
2008
IEEE
145views Multimedia» more  ICMCS 2008»
14 years 2 months ago
Video search reranking via online ordinal reranking
To exploit co-occurrence patterns among features and target semantics while keeping the simplicity of the keywordbased visual search, a novel reranking methods is proposed. The ap...
Yi-Hsuan Yang, Winston H. Hsu