Sciweavers

2816 search results - page 33 / 564
» Submodular function minimization
Sort
View
ICICS
2004
Springer
14 years 4 months ago
On the Minimal Assumptions of Group Signature Schemes
Abstract. One of the central lines of cryptographic research is identifying the weakest assumptions required for the construction of secure primitives. In the context of group sign...
Michel Abdalla, Bogdan Warinschi
MOR
2002
60views more  MOR 2002»
13 years 10 months ago
Properties of the Log-Barrier Function on Degenerate Nonlinear Programs
We examine the sequence of local minimizers of the log-barrier function for a nonlinear program near a solution at which second-order sufficient conditions and the Mangasarian-From...
Stephen J. Wright, Dominique Orban
CVPR
2006
IEEE
15 years 29 days ago
Correlated Label Propagation with Application to Multi-label Learning
Many computer vision applications, such as scene analysis and medical image interpretation, are ill-suited for traditional classification where each image can only be associated w...
Feng Kang, Rong Jin, Rahul Sukthankar
APPROX
2009
Springer
142views Algorithms» more  APPROX 2009»
14 years 5 months ago
Truthful Mechanisms via Greedy Iterative Packing
An important research thread in algorithmic game theory studies the design of efficient truthful mechanisms that approximate the optimal social welfare. A fundamental question is ...
Chandra Chekuri, Iftah Gamzu
CIKM
2008
Springer
14 years 29 days ago
Representative entry selection for profiling blogs
Many applications on blog search and mining often meet the challenge of handling huge volume of blog data, in which one single blog could contain hundreds or even thousands of ent...
Jinfeng Zhuang, Steven C. H. Hoi, Aixin Sun, Rong ...