Sciweavers

NA
2010
87views more  NA 2010»
13 years 8 months ago
A note on the O(n)-storage implementation of the GKO algorithm and its adaptation to Trummer-like matrices
We propose a new O(n)-space implementation of the GKO-Cauchy algorithm for the solution of linear systems where the coefficient matrix is Cauchy-like. Moreover, this new algorithm...
Federico Poloni
MOR
2010
120views more  MOR 2010»
13 years 8 months ago
Proximal Alternating Minimization and Projection Methods for Nonconvex Problems: An Approach Based on the Kurdyka-Lojasiewicz In
We study the convergence properties of an alternating proximal minimization algorithm for nonconvex structured functions of the type: L(x, y) = f(x)+Q(x, y)+g(y), where f : Rn → ...
Hedy Attouch, Jérôme Bolte, Patrick R...
ML
2010
ACM
142views Machine Learning» more  ML 2010»
13 years 8 months ago
Fast adaptive algorithms for abrupt change detection
We propose two fast algorithms for abrupt change detection in streaming data that can operate on arbitrary unknown data distributions before and after the change. The first algor...
Daniel Nikovski, Ankur Jain
MIR
2010
ACM
207views Multimedia» more  MIR 2010»
13 years 8 months ago
Learning to rank for content-based image retrieval
In Content-based Image Retrieval (CBIR), accurately ranking the returned images is of paramount importance, since users consider mostly the topmost results. The typical ranking st...
Fabio F. Faria, Adriano Veloso, Humberto Mossri de...
KDD
2010
ACM
217views Data Mining» more  KDD 2010»
13 years 8 months ago
Mining program workflow from interleaved traces
Successful software maintenance is becoming increasingly critical due to the increasing dependence of our society and economy on software systems. One key problem of software main...
Jian-Guang Lou, Qiang Fu, Shengqi Yang, Jiang Li, ...
KDD
2010
ACM
244views Data Mining» more  KDD 2010»
13 years 8 months ago
Finding effectors in social networks
Assume a network (V, E) where a subset of the nodes in V are active. We consider the problem of selecting a set of k active nodes that best explain the observed activation state, ...
Theodoros Lappas, Evimaria Terzi, Dimitrios Gunopu...
JVCIR
2010
123views more  JVCIR 2010»
13 years 8 months ago
Prediction of transmission distortion for wireless video communication: Algorithm and application
In this paper, we develop algorithms for estimating transmission distortion in wireless video communication systems. By leveraging the analytical results obtained in our previous ...
Zhifeng Chen, Dapeng Wu
JUCS
2010
265views more  JUCS 2010»
13 years 8 months ago
3D Head Pose and Facial Expression Tracking using a Single Camera
: Algorithms for 3D head pose and facial expression tracking using a single camera (monocular image sequences) is presented in this paper. The proposed method is based on a combina...
Lucas D. Terissi, Juan Carlos Gomez
JPDC
2010
97views more  JPDC 2010»
13 years 8 months ago
Stabilizing leader election in partial synchronous systems with crash failures
This article deals with stabilization and fault-tolerance. We consider two types of stabilization: the self- and the pseudo- stabilization. Our goal is to implement the self- and/...
Carole Delporte-Gallet, Stéphane Devismes, ...
JMLR
2010
143views more  JMLR 2010»
13 years 8 months ago
A Quasi-Newton Approach to Nonsmooth Convex Optimization Problems in Machine Learning
We extend the well-known BFGS quasi-Newton method and its memory-limited variant LBFGS to the optimization of nonsmooth convex objectives. This is done in a rigorous fashion by ge...
Jin Yu, S. V. N. Vishwanathan, Simon Günter, ...