Sciweavers

493 search results - page 67 / 99
» The oracle penalty method
Sort
View
SIGSOFT
2007
ACM
14 years 10 months ago
Recommending random walks
We improve on previous recommender systems by taking advantage of the layered structure of software. We use a random-walk approach, mimicking the more focused behavior of a develo...
Zachary M. Saul, Vladimir Filkov, Premkumar T. Dev...
DCC
2007
IEEE
14 years 9 months ago
Distributed Grayscale Stereo Image Coding with Unsupervised Learning of Disparity
Distributed compression is particularly attractive for stereo images since it avoids communication between cameras. Since compression performance depends on exploiting the redunda...
David P. Varodayan, Aditya Mavlankar, Markus Flier...
ICASSP
2009
IEEE
14 years 4 months ago
Unsupervised acoustic and language model training with small amounts of labelled data
We measure the effects of a weak language model, estimated from as little as 100k words of text, on unsupervised acoustic model training and then explore the best method of using ...
Scott Novotney, Richard M. Schwartz, Jeff Ma
ICAC
2005
IEEE
14 years 3 months ago
Multi-resolution Abnormal Trace Detection Using Varied-length N-grams and Automata
Detection and diagnosis of faults in a large-scale distributed system is a formidable task. Interest in monitoring and using traces of user requests for fault detection has been o...
Guofei Jiang, Haifeng Chen, Cristian Ungureanu, Ke...
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
14 years 3 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng