Sciweavers

2449 search results - page 442 / 490
» Tensor Embedding Methods
Sort
View
ICDM
2010
IEEE
200views Data Mining» more  ICDM 2010»
13 years 5 months ago
Bayesian Maximum Margin Clustering
Abstract--Most well-known discriminative clustering models, such as spectral clustering (SC) and maximum margin clustering (MMC), are non-Bayesian. Moreover, they merely considered...
Bo Dai, Baogang Hu, Gang Niu
FOCM
2011
175views more  FOCM 2011»
13 years 2 months ago
Convergence of Fixed-Point Continuation Algorithms for Matrix Rank Minimization
The matrix rank minimization problem has applications in many fields such as system identification, optimal control, low-dimensional embedding etc. As this problem is NP-hard in ...
Donald Goldfarb, Shiqian Ma
CDC
2010
IEEE
106views Control Systems» more  CDC 2010»
13 years 2 months ago
On the robustness of sampled-data systems to uncertainty in continuous-time delays
Abstract--In this note, we consider the robust stability of sampleddata systems with respect to continuous-time delay. We argue that many results in the literature implicitly assum...
Igal Alterman, Leonid Mirkin
MTA
2011
260views Hardware» more  MTA 2011»
13 years 2 months ago
An audio watermarking scheme using singular value decomposition and dither-modulation quantization
Quantization index modulation is one of the best methods for performing blind watermarking, due to its simplicity and good rate-distortion-robustness tradeoffs. In this paper, a ne...
Vivekananda Bhat K., Indranil Sengupta, Abhijit Da...
JCST
2010
147views more  JCST 2010»
13 years 2 months ago
A Multi-Key Pirate Decoder Against Traitor Tracing Schemes
In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protect...
Yongdong Wu, Robert H. Deng