Sciweavers

882 search results - page 146 / 177
» Visibility-driven transfer functions
Sort
View
ACISP
2009
Springer
13 years 11 months ago
Efficiency Bounds for Adversary Constructions in Black-Box Reductions
Abstract. We establish a framework for bounding the efficiency of cryptographic reductions in terms of their security transfer. While efficiency bounds for the reductions have been...
Ahto Buldas, Aivo Jürgenson, Margus Niitsoo
NIPS
2007
13 years 9 months ago
Multi-task Gaussian Process Prediction
In this paper we investigate multi-task learning in the context of Gaussian Processes (GP). We propose a model that learns a shared covariance function on input-dependent features...
Edwin V. Bonilla, Kian Ming Chai, Christopher K. I...
FMOODS
2003
13 years 9 months ago
Design and Verification of Distributed Multi-media Systems
Performance analysis of computing systems, in particular distributed computing systems, is a complex process. Analysing the complex flows and interactions between a set of distribu...
David H. Akehurst, John Derrick, A. Gill Waters
GECCO
2008
Springer
124views Optimization» more  GECCO 2008»
13 years 8 months ago
Runtime analysis of binary PSO
We investigate the runtime of the Binary Particle Swarm Optimization (PSO) algorithm introduced by Kennedy and Eberhart (1997). The Binary PSO maintains a global best solution and...
Dirk Sudholt, Carsten Witt
ICASSP
2010
IEEE
13 years 8 months ago
Autoregressive modeling of voiced speech
It is well known that the classical linear predictive model for speech fails to take into account the quasi-periodic nature of the glottal flow typical of voiced speech. In this ...
Maria A. Berezina, Daniel Rudoy, Patrick J. Wolfe