Sciweavers

5344 search results - page 105 / 1069
» Privacy-Preserving Set Operations
Sort
View
COSIT
2007
Springer
120views GIS» more  COSIT 2007»
15 years 8 months ago
Relations in Mathematical Morphology with Applications to Graphs and Rough Sets
Rough sets have been applied in spatial information theory to construct theories of granularity – presenting information at different levels of detail. Mathematical morphology c...
John G. Stell
APCSAC
2001
IEEE
15 years 6 months ago
High-Performance Extendable Instruction Set Computing
In this paper, a new architecture called the extendable instruction set computer (EISC) is introduced that addresses the issues of memory size and performance in embedded micropro...
Heui Lee, Paul Becket, Bill Appelbe
HIS
2003
15 years 3 months ago
On a Set Theory With Uncertain Membership Relations
We logically model uncertainty by expanding language without changing logical reasoning rules. We expand the language of set theory by adding new predicate symbols, uncertain membe...
Shunsuke Yatabe, Yuzuru Kakuda, Makoto Kikuchi
JMLR
2006
89views more  JMLR 2006»
15 years 2 months ago
Maximum-Gain Working Set Selection for SVMs
Support vector machines are trained by solving constrained quadratic optimization problems. This is usually done with an iterative decomposition algorithm operating on a small wor...
Tobias Glasmachers, Christian Igel
PR
2002
85views more  PR 2002»
15 years 2 months ago
An incremental prototype set building technique
This paper deals with the task of "nding a set of prototypes from the training set. A reduced set is obtained which is used instead of the training set when nearest neighbour...
V. Susheela Devi, M. Narasimha Murty