Sciweavers

146 search results - page 14 / 30
» Independence Assumptions Considered Harmful
Sort
View
NIPS
2004
13 years 8 months ago
A Topographic Support Vector Machine: Classification Using Local Label Configurations
The standard approach to the classification of objects is to consider the examples as independent and identically distributed (iid). In many real world settings, however, this ass...
Johannes Mohr, Klaus Obermayer
SCN
2008
Springer
13 years 7 months ago
Simplified Submission of Inputs to Protocols
Consider an electronic election scheme implemented using a mix-net; a large number of voters submit their votes and then a smaller number of servers compute the result. The mix-net...
Douglas Wikström
ECCV
2004
Springer
14 years 9 months ago
Intrinsic Images by Entropy Minimization
A method was recently devised for the recovery of an invariant image from a 3-band colour image. The invariant image, originally 1D greyscale but here derived as a 2D chromaticity,...
Graham D. Finlayson, Mark S. Drew, Cheng Lu
PODS
2008
ACM
174views Database» more  PODS 2008»
14 years 7 months ago
Epistemic privacy
We present a novel definition of privacy in the framework of offline (retroactive) database query auditing. Given information about the database, a description of sensitive data, ...
Alexandre V. Evfimievski, Ronald Fagin, David P. W...
INFOCOM
2008
IEEE
14 years 1 months ago
Index Policies for Real-Time Multicast Scheduling for Wireless Broadcast Systems
Abstract—Motivated by the increasing usage of wireless broadcast networks for multicast real-time applications like video, this paper considers a canonical real-time multicast sc...
Vivek Raghunathan, Vivek S. Borkar, Min Cao, P. R....