Sciweavers

727 search results - page 29 / 146
» Two thresholds are better than one
Sort
View
PRL
2006
96views more  PRL 2006»
13 years 7 months ago
Fast codebook search algorithms based on tree-structured vector quantization
Tree-Structured Vector Quantization (TSVQ) is a highly efficient technique for locating an appropriate codeword for each input vector. The algorithm does not guarantee that the sel...
Chin-Chen Chang, Yu-Chiang Li, Jun-Bin Yeh
GLOBECOM
2009
IEEE
14 years 2 months ago
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li
WEBI
2010
Springer
13 years 5 months ago
An Approach to Model and Predict the Popularity of Online Contents with Explanatory Factors
In this paper, we propose a methodology to predict the popularity of online contents. More precisely, rather than trying to infer the popularity of a content itself, we infer the l...
Jong Gun Lee, Sue Moon, Kavé Salamatian
PKDD
2007
Springer
131views Data Mining» more  PKDD 2007»
14 years 1 months ago
Expectation Propagation for Rating Players in Sports Competitions
Abstract. Rating players in sports competitions based on game results is one example of paired comparison data analysis. Since an exact Bayesian treatment is intractable, several t...
Adriana Birlutiu, Tom Heskes
JOC
2000
95views more  JOC 2000»
13 years 7 months ago
Player Simulation and General Adversary Structures in Perfect Multiparty Computation
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party am...
Martin Hirt, Ueli M. Maurer