Sciweavers

1797 search results - page 35 / 360
» Regularized Winnow Methods
Sort
View
IJNSEC
2006
111views more  IJNSEC 2006»
13 years 7 months ago
Ideal Secret Sharing Schemes from Permutations
The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restri...
Josef Pieprzyk, Xian-Mo Zhang
JGO
2010
89views more  JGO 2010»
13 years 6 months ago
Iterative regularization algorithms for constrained image deblurring on graphics processors
Abstract The ability of the modern graphics processors to operate on large matrices in parallel can be exploited for solving constrained image deblurring problems in a short time. ...
Valeria Ruggiero, Thomas Serafini, Riccardo Zanell...
JCT
2007
117views more  JCT 2007»
13 years 7 months ago
Large independent sets in regular graphs of large girth
Let G be a d-regular graph with girth g, and let α be the independence number of G. We show that α(G) ≥ 1 2 1 − (d − 1)−2/(d−2) − (g) n where (g) → 0 as g → ∞,...
Joseph Lauer, Nicholas C. Wormald
PRL
2007
154views more  PRL 2007»
13 years 7 months ago
Regularized mixture discriminant analysis
Abstract – In this paper we seek a Gaussian mixture model (GMM) of the classconditional densities for plug-in Bayes classification. We propose a method for setting the number of ...
Zohar Halbe, Mayer Aladjem
FGR
2004
IEEE
132views Biometrics» more  FGR 2004»
13 years 11 months ago
Expand Training Set for Face Detection by GA Re-sampling
Data collection for both training and testing a classifier is a tedious but essential step towards face detection and recognition. All of the statistical methods suffer from this ...
Jie Chen, Xilin Chen, Wen Gao