Sciweavers

506 search results - page 99 / 102
» Multiple Kernel Learning with High Order Kernels
Sort
View
ASIACRYPT
2010
Springer
13 years 5 months ago
Leakage Resilient ElGamal Encryption
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order...
Eike Kiltz, Krzysztof Pietrzak
IJCV
2006
206views more  IJCV 2006»
13 years 7 months ago
Random Sampling for Subspace Face Recognition
Subspacefacerecognitionoftensuffersfromtwoproblems:(1)thetrainingsamplesetissmallcompared with the high dimensional feature vector; (2) the performance is sensitive to the subspace...
Xiaogang Wang, Xiaoou Tang
ICML
2009
IEEE
14 years 8 months ago
Multi-assignment clustering for Boolean data
Conventional clustering methods typically assume that each data item belongs to a single cluster. This assumption does not hold in general. In order to overcome this limitation, w...
Andreas P. Streich, Mario Frank, David A. Basin, J...
INFOCOM
2007
IEEE
14 years 1 months ago
Measurement-Based Self Organization of Interfering 802.11 Wireless Access Networks
— The popularity of IEEE 802.11 WLANs has led to dense deployments in urban areas. High density leads to suboptimal performance unless the interfering networks learn how to optim...
Bruno Kauffmann, François Baccelli, Augusti...
KDD
2005
ACM
107views Data Mining» more  KDD 2005»
14 years 1 months ago
Predicting the product purchase patterns of corporate customers
This paper describes TIPPPS (Time Interleaved Product Purchase Prediction System), which analyses billing data of corporate customers in a large telecommunications company in orde...
Bhavani Raskutti, Alan Herschtal