Sciweavers

10156 search results - page 10 / 2032
» Step by Step to Histories
Sort
View
IJCNLP
2005
Springer
14 years 1 months ago
Classifying Chinese Texts in Two Steps
Abstract. This paper proposes a two-step method for Chinese text categorization (TC). In the first step, a Naïve Bayesian classifier is used to fix the fuzzy area between two cate...
Xinghua Fan, Maosong Sun, Key-Sun Choi, Qin Zhang
FSE
2008
Springer
141views Cryptology» more  FSE 2008»
13 years 10 months ago
Collisions for Step-Reduced SHA-256
In this article we find collisions for step-reduced SHA-256. We develop a differential that holds with high probability if the message satisfies certain conditions. We solve the eq...
Ivica Nikolic, Alex Biryukov
IJSN
2006
65views more  IJSN 2006»
13 years 8 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang
JUCS
2008
159views more  JUCS 2008»
13 years 8 months ago
Two Step Swarm Intelligence to Solve the Feature Selection Problem
: In this paper we propose a new approach to Swarm Intelligence called Two-Step Swarm Intelligence. The basic idea is to split the heuristic search performed by agents into two sta...
Yudel Gómez, Rafael Bello, Amilkar Puris, M...
JMLR
2006
116views more  JMLR 2006»
13 years 8 months ago
Step Size Adaptation in Reproducing Kernel Hilbert Space
This paper presents an online support vector machine (SVM) that uses the stochastic meta-descent (SMD) algorithm to adapt its step size automatically. We formulate the online lear...
S. V. N. Vishwanathan, Nicol N. Schraudolph, Alex ...