Sciweavers

11488 search results - page 1974 / 2298
» Robust optimization - methodology and applications
Sort
View
140
Voted
AGTIVE
2007
Springer
15 years 10 months ago
A First Experimental Evaluation of Search Plan Driven Graph Pattern Matching
Abstract. With graph pattern matching the field of graph transformation (GT) includes an NP-complete subtask. But for real-life applications it is essential that graph pattern mat...
Gernot Veit Batz, Moritz Kroll, Rubino Geiß
139
Voted
AIME
2007
Springer
15 years 10 months ago
Predictive Modeling of fMRI Brain States Using Functional Canonical Correlation Analysis
We present a novel method for predictive modeling of human brain states from functional neuroimaging (fMRI) data. Extending the traditional canonical correlation analysis of discre...
Sennay Ghebreab, Arnold W. M. Smeulders, Pieter W....
CCS
2007
ACM
15 years 10 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport
COLT
2007
Springer
15 years 10 months ago
A Lower Bound for Agnostically Learning Disjunctions
We prove that the concept class of disjunctions cannot be pointwise approximated by linear combinations of any small set of arbitrary real-valued functions. That is, suppose there ...
Adam R. Klivans, Alexander A. Sherstov
CPAIOR
2007
Springer
15 years 10 months ago
A Global Constraint for Total Weighted Completion Time
We introduce a novel global constraint for the total weighted completion time of activities on a single unary capacity resource. For propagating the constraint, an O(n4 ) algorithm...
András Kovács, J. Christopher Beck
« Prev « First page 1974 / 2298 Last » Next »