Sciweavers

1599 search results - page 289 / 320
» Probabilistic Analysis of Anonymity
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
A robust optimization approach to backup network design with random failures
—This paper presents a scheme in which a dedicated backup network is designed to provide protection from random link failures. Upon a link failure in the primary network, traffi...
Matthew Johnston, Hyang-Won Lee, Eytan Modiano
ICCV
2011
IEEE
12 years 8 months ago
Inferring Social Relations from Visual Concepts
In this paper, we study the problem of social relational inference using visual concepts which serve as indicators of actors’ social interactions. While social network analysis ...
Lei Ding, Alper Yilmaz
ICA
2012
Springer
12 years 3 months ago
Online PLCA for Real-Time Semi-supervised Source Separation
Non-negative spectrogram factorization algorithms such as probabilistic latent component analysis (PLCA) have been shown to be quite powerful for source separation. When training d...
Zhiyao Duan, Gautham J. Mysore, Paris Smaragdis
SDM
2012
SIAM
237views Data Mining» more  SDM 2012»
11 years 10 months ago
A Distributed Kernel Summation Framework for General-Dimension Machine Learning
Kernel summations are a ubiquitous key computational bottleneck in many data analysis methods. In this paper, we attempt to marry, for the first time, the best relevant technique...
Dongryeol Lee, Richard W. Vuduc, Alexander G. Gray
AAAI
2012
11 years 10 months ago
Identifying Bullies with a Computer Game
Current computer involvement in adolescent social networks (youth between the ages of 11 and 17) provides new opportunities to study group dynamics, interactions amongst peers, an...
Juan Fernando Mancilla-Caceres, Wen Pu, Eyal Amir,...