Sciweavers

950 search results - page 127 / 190
» Modified global k
Sort
View
FOCM
2007
94views more  FOCM 2007»
13 years 10 months ago
Trust-Region Methods on Riemannian Manifolds
A general scheme for trust-region methods on Riemannian manifolds is proposed and analyzed. Among the various approaches available to (approximately) solve the trust-region subpro...
Pierre-Antoine Absil, C. G. Baker, Kyle A. Galliva...
JUCS
2002
145views more  JUCS 2002»
13 years 9 months ago
Webs, Grids and Knowledge Spaces: Programmes, Projects and Prospects
: Many believe that today's Web has not yet reached the full potential which globally distributed systems may achieve in terms of information access and use. Realizing this po...
Hans-Georg Stork
CSL
2011
Springer
13 years 5 months ago
The subspace Gaussian mixture model - A structured model for speech recognition
We describe a new approach to speech recognition, in which all Hidden Markov Model (HMM) states share the same Gaussian Mixture Model (GMM) structure with the same number of Gauss...
Daniel Povey, Lukas Burget, Mohit Agarwal, Pinar A...
TIFS
2011
259views Education» more  TIFS 2011»
13 years 4 months ago
Periocular Biometrics in the Visible Spectrum
— Periocular biometric refers to the facial region in the immediate vicinity of the eye. Acquisition of the periocular biometric does not require high user cooperation and close ...
Unsang Park, Raghavender R. Jillela, Arun Ross, An...
CORR
2011
Springer
167views Education» more  CORR 2011»
13 years 1 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko