Sciweavers

89222 search results - page 17579 / 17845
» Which
Sort
View
143
Voted
DMIN
2010
262views Data Mining» more  DMIN 2010»
15 years 1 months ago
SMO-Style Algorithms for Learning Using Privileged Information
Recently Vapnik et al. [11, 12, 13] introduced a new learning model, called Learning Using Privileged Information (LUPI). In this model, along with standard training data, the tea...
Dmitry Pechyony, Rauf Izmailov, Akshay Vashist, Vl...
154
Voted
EGH
2010
Springer
15 years 1 months ago
Parallel SAH k-D tree construction
The k-D tree is a well-studied acceleration data structure for ray tracing. It is used to organize primitives in a scene to allow efficient execution of intersection operations be...
Byn Choi, Rakesh Komuravelli, Victor Lu, Hyojin Su...
152
Voted
EMNLP
2010
15 years 1 months ago
Improving Mention Detection Robustness to Noisy Input
Information-extraction (IE) research typically focuses on clean-text inputs. However, an IE engine serving real applications yields many false alarms due to less-well-formed input...
Radu Florian, John F. Pitrelli, Salim Roukos, Imed...
176
Voted
EMNLP
2010
15 years 1 months ago
Holistic Sentiment Analysis Across Languages: Multilingual Supervised Latent Dirichlet Allocation
In this paper, we develop multilingual supervised latent Dirichlet allocation (MLSLDA), a probabilistic generative model that allows insights gleaned from one language's data...
Jordan L. Boyd-Graber, Philip Resnik
165
Voted
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
15 years 1 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
« Prev « First page 17579 / 17845 Last » Next »