Sciweavers

209 search results - page 21 / 42
» Learning from defect removals
Sort
View
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
SIGGRAPH
2009
ACM
14 years 2 months ago
Educating technophile artists: experiences from a highly successful computer animation undergraduate programme
Over the past few decades, the arts have become increasingly dependent on and influenced by the development of computer technology. In the 1960s pioneering artists experimented w...
Peter Comninos, Leigh McLoughlin, Eike Falk Anders...
CVPR
2006
IEEE
14 years 9 months ago
Image Denoising Via Learned Dictionaries and Sparse representation
We address the image denoising problem, where zeromean white and homogeneous Gaussian additive noise should be removed from a given image. The approach taken is based on sparse an...
Michael Elad, Michal Aharon
AI
1998
Springer
13 years 12 months ago
ELEM2: A Learning System for More Accurate Classifications
We present ELEM2, a new method for inducing classification rules from a set of examples. The method employs several new strategies in the induction and classification processes to ...
Aijun An, Nick Cercone
IJCAI
1989
13 years 8 months ago
Noise-Tolerant Instance-Based Learning Algorithms
Several published reports show that instancebased learning algorithms yield high classification accuracies and have low storage requirements during supervised learning application...
David W. Aha, Dennis F. Kibler