Sciweavers

79 search results - page 10 / 16
» Remarks on solutions of a fourth-order problem
Sort
View
SOUPS
2005
ACM
14 years 1 months ago
Making PRIME usable
Privacy-enhanced Identity Management can enable users to retain and maintain informational self-determination in our networked society. This paper describes the usability research...
John Sören Pettersson, Simone Fischer-Hü...
FC
2005
Springer
87views Cryptology» more  FC 2005»
14 years 1 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
JMLR
2008
141views more  JMLR 2008»
13 years 7 months ago
Accelerated Neural Evolution through Cooperatively Coevolved Synapses
Many complex control problems require sophisticated solutions that are not amenable to traditional controller design. Not only is it difficult to model real world systems, but oft...
Faustino J. Gomez, Jürgen Schmidhuber, Risto ...
JMLR
2006
105views more  JMLR 2006»
13 years 7 months ago
Parallel Software for Training Large Scale Support Vector Machines on Multiprocessor Systems
Parallel software for solving the quadratic program arising in training support vector machines for classification problems is introduced. The software implements an iterative dec...
Luca Zanni, Thomas Serafini, Gaetano Zanghirati
ISBI
2004
IEEE
14 years 8 months ago
Noise Analysis for Diffraction Enhanced Imaging
Herein we present a quantitative noise analysis of diffraction enhanced imaging (DEI), an x-ray imaging method that produces absorption and refraction images, with inherent immuni...
Miles N. Wernick, Jovan G. Brankov, Alejandro Saiz...