Sciweavers

4335 search results - page 82 / 867
» Privatizing Constraint Optimization
Sort
View
ICANN
2003
Springer
14 years 2 months ago
Sparse Coding with Invariance Constraints
We suggest a new approach to optimize the learning of sparse features under the constraints of explicit transformation symmetries imposed on the set of feature vectors. Given a set...
Heiko Wersing, Julian Eggert, Edgar Körner
DAGSTUHL
2007
13 years 10 months ago
Graph matching with type constraints on nodes and edges
Abstract. In this paper, we consider two particular problems of directed graph matching. The first problem concerns graphs with nodes that have been subdivided into classes of di...
Catherine Fraikin, Paul Van Dooren
ACNS
2009
Springer
123views Cryptology» more  ACNS 2009»
14 years 3 months ago
Practical Secure Evaluation of Semi-private Functions
Abstract. Two-party Secure Function Evaluation (SFE) is a very useful cryptographic tool which allows two parties to evaluate a function known to both parties on their private (sec...
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
CSCLP
2007
Springer
14 years 3 months ago
Preference-Based Problem Solving for Constraint Programming
Abstract. Combinatorial problems such as scheduling, resource allocation, and configuration have many attributes that can be subject of user preferences. Traditional optimization ...
Ulrich Junker
ICASSP
2011
IEEE
13 years 20 days ago
Efficient image reconstruction under sparsity constraints with application to MRI and bioluminescence tomography
Most bioimaging modalities rely on indirect measurements of the quantity under investigation. The image is obtained as the result of an optimization problem involving a physical m...
Matthieu Guerquin-Kern, Jean-Charles Baritaux, Mic...