Sciweavers

327 search results - page 25 / 66
» Privacy-Preserving Singular Value Decomposition
Sort
View
JCNS
2010
96views more  JCNS 2010»
15 years 2 months ago
Rapid determination of particle velocity from space-time images using the Radon transform
Laser-scanning methods are a means to observe streaming particles, such as the flow of red blood cells in a blood vessel. Typically, particle velocity is extracted from images form...
Patrick J. Drew, Pablo Blinder, Gert Cauwenberghs,...
RECSYS
2010
ACM
15 years 2 months ago
Merging multiple criteria to identify suspicious reviews
Assessing the trustworthiness of reviews is a key issue for the maintainers of opinion sites such as TripAdvisor, given the rewards that can be derived from posting false or biase...
Guangyu Wu, Derek Greene, Padraig Cunningham
CVPR
2010
IEEE
15 years 2 months ago
Efficient computation of robust low-rank matrix approximations in the presence of missing data using the L1 norm
The calculation of a low-rank approximation of a matrix is a fundamental operation in many computer vision applications. The workhorse of this class of problems has long been the ...
Anders Eriksson, Anton van den Hengel
FOCM
2011
175views more  FOCM 2011»
14 years 11 months ago
Convergence of Fixed-Point Continuation Algorithms for Matrix Rank Minimization
The matrix rank minimization problem has applications in many fields such as system identification, optimal control, low-dimensional embedding etc. As this problem is NP-hard in ...
Donald Goldfarb, Shiqian Ma
SDM
2011
SIAM
414views Data Mining» more  SDM 2011»
14 years 7 months ago
Clustered low rank approximation of graphs in information science applications
In this paper we present a fast and accurate procedure called clustered low rank matrix approximation for massive graphs. The procedure involves a fast clustering of the graph and...
Berkant Savas, Inderjit S. Dhillon