Sciweavers

15120 search results - page 2794 / 3024
» Learning with Local Models
Sort
View
CCS
2007
ACM
15 years 8 months ago
Chosen-ciphertext secure proxy re-encryption
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a di...
Ran Canetti, Susan Hohenberger
CIKM
2007
Springer
15 years 8 months ago
The role of documents vs. queries in extracting class attributes from text
Challenging the implicit reliance on document collections, this paper discusses the pros and cons of using query logs rather than document collections, as self-contained sources o...
Marius Pasca, Benjamin Van Durme, Nikesh Garera
EMMCVPR
2007
Springer
15 years 8 months ago
Bottom-Up Recognition and Parsing of the Human Body
Recognizing humans, estimating their pose and segmenting their body parts are key to high-level image understanding. Because humans are highly articulated, the range of deformation...
Praveen Srinivasan, Jianbo Shi
EUROPAR
2007
Springer
15 years 8 months ago
Experiences Understanding Performance in a Commercial Scale-Out Environment
Abstract. Clusters of loosely connected machines are becoming an important model for commercial computing. The cost/performance ratio makes these scale-out solutions an attractive ...
Robert W. Wisniewski, Reza Azimi, Mathieu Desnoyer...
GECCO
2007
Springer
154views Optimization» more  GECCO 2007»
15 years 8 months ago
Cross entropy and adaptive variance scaling in continuous EDA
This paper deals with the adaptive variance scaling issue in continuous Estimation of Distribution Algorithms. A phenomenon is discovered that current adaptive variance scaling me...
Yunpeng Cai, Xiaomin Sun, Hua Xu, Peifa Jia
« Prev « First page 2794 / 3024 Last » Next »