Sciweavers

331 search results - page 21 / 67
» Vicinal Risk Minimization
Sort
View
CORR
2010
Springer
115views Education» more  CORR 2010»
15 years 2 months ago
Tight oracle bounds for low-rank matrix recovery from a minimal number of random measurements
This paper presents several novel theoretical results regarding the recovery of a low-rank matrix from just a few measurements consisting of linear combinations of the matrix entr...
Emmanuel J. Candès, Yaniv Plan
ICASSP
2009
IEEE
15 years 11 months ago
Risk-distortion analysis for video collusion attack
Collusion attack is a cost-effective attack against digital fingerprint. To develop an efficient collusion-resistant fingerprint scheme, it is very important for the detector t...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
EUROGP
2009
Springer
149views Optimization» more  EUROGP 2009»
15 years 10 months ago
Adaptation, Performance and Vapnik-Chervonenkis Dimension of Straight Line Programs
Abstract. We discuss here empirical comparation between model selection methods based on Linear Genetic Programming. Two statistical methods are compared: model selection based on ...
José Luis Montaña, César Luis...
ICPR
2004
IEEE
16 years 5 months ago
Signal Discrimination Using a Support Vector Machine for Genetic Syndrome Diagnosis
In this study, a support vector machine (SVM) classifies real world data of cytogenetic signals measured from fluorescence in-situ hybridization (FISH) images in order to diagnose...
Amit David, Boaz Lerner
FC
2009
Springer
121views Cryptology» more  FC 2009»
15 years 10 months ago
Achieving Privacy in a Federated Identity Management System
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Susan Landau, Hubert Lê Van Gông, Robi...