Sciweavers

11488 search results - page 2006 / 2298
» Robust optimization - methodology and applications
Sort
View
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
15 years 9 months ago
Incorporating prior knowledge with weighted margin support vector machines
Like many purely data-driven machine learning methods, Support Vector Machine (SVM) classifiers are learned exclusively from the evidence presented in the training dataset; thus ...
Xiaoyun Wu, Rohini K. Srihari
LOPSTR
2004
Springer
15 years 9 months ago
Determinacy Analysis for Logic Programs Using Mode and Type Information
We propose an analysis for detecting procedures and goals that are deterministic (i.e. that produce at most one solution), or predicates whose clause tests are mutually exclusive (...
Pedro López-García, Francisco Bueno,...
NOSSDAV
2004
Springer
15 years 9 months ago
Low latency and cheat-proof event ordering for peer-to-peer games
We are developing a distributed architecture for massivelymultiplayer games. In this paper, we focus on designing a low-latency event ordering protocol, called NEO, for this archi...
Chris GauthierDickey, Daniel Zappala, Virginia Mar...
PCM
2004
Springer
99views Multimedia» more  PCM 2004»
15 years 9 months ago
An Online Learning Framework for Sports Video View Classification
Sports videos have special characteristics such as well-defined video structure, specialized sports syntax, and some canonical view types. In this paper, we proposed an online lear...
Jun Wu, Xian-Sheng Hua, Jianmin Li, Bo Zhang, Hong...
SACRYPT
2004
Springer
125views Cryptology» more  SACRYPT 2004»
15 years 9 months ago
Password Based Key Exchange with Mutual Authentication
A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Li...
Shaoquan Jiang, Guang Gong
« Prev « First page 2006 / 2298 Last » Next »