Results 1 - 10
of
1,771
Training Support Vector Machines: an Application to Face Detection
, 1997
"... We investigate the application of Support Vector Machines (SVMs) in computer vision. SVM is a learning technique developed by V. Vapnik and his team (AT&T Bell Labs.) that can be seen as a new method for training polynomial, neural network, or Radial Basis Functions classifiers. The decision sur ..."
Abstract
-
Cited by 727 (1 self)
- Add to MetaCart
We investigate the application of Support Vector Machines (SVMs) in computer vision. SVM is a learning technique developed by V. Vapnik and his team (AT&T Bell Labs.) that can be seen as a new method for training polynomial, neural network, or Radial Basis Functions classifiers. The decision
The pyramid match kernel: Discriminative classification with sets of image features
- IN ICCV
, 2005
"... Discriminative learning is challenging when examples are sets of features, and the sets vary in cardinality and lack any sort of meaningful ordering. Kernel-based classification methods can learn complex decision boundaries, but a kernel over unordered set inputs must somehow solve for correspondenc ..."
Abstract
-
Cited by 544 (29 self)
- Add to MetaCart
for use in learning algorithms whose optimal solutions are guaranteed only for Mercer kernels. We demonstrate our algorithm on object recognition tasks and show it to be accurate and dramatically faster than current approaches.
Are Loan Guarantees Effective? The Case of Mexican Government Banks.” Mexico: Banco de México. http://ssrn.com/abstract=637385
- and Poland.” Department for International Development
, 2005
"... exican Government’s Banks offer loan guarantees to private banks in order to spur credit directed to non-financial small and medium sized firms and this policy is examined here. Application of representative data to the comparative static analysis of the guarantee-use decision suggests that these sc ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
exican Government’s Banks offer loan guarantees to private banks in order to spur credit directed to non-financial small and medium sized firms and this policy is examined here. Application of representative data to the comparative static analysis of the guarantee-use decision suggests
The iSLIP Scheduling Algorithm for Input-Queued Switches
, 1999
"... An increasing number of high performance internetworking protocol routers, LAN and asynchronous transfer mode (ATM) switches use a switched backplane based on a crossbar switch. Most often, these systems use input queues to hold packets waiting to traverse the switching fabric. It is well known th ..."
Abstract
-
Cited by 425 (8 self)
- Add to MetaCart
An increasing number of high performance internetworking protocol routers, LAN and asynchronous transfer mode (ATM) switches use a switched backplane based on a crossbar switch. Most often, these systems use input queues to hold packets waiting to traverse the switching fabric. It is well known
The Relationship Between Precision-Recall and ROC Curves
- In ICML ’06: Proceedings of the 23rd international conference on Machine learning
, 2006
"... Receiver Operator Characteristic (ROC) curves are commonly used to present results for binary decision problems in machine learning. However, when dealing with highly skewed datasets, Precision-Recall (PR) curves give a more informative picture of an algorithm’s performance. We show that a deep conn ..."
Abstract
-
Cited by 415 (4 self)
- Add to MetaCart
Receiver Operator Characteristic (ROC) curves are commonly used to present results for binary decision problems in machine learning. However, when dealing with highly skewed datasets, Precision-Recall (PR) curves give a more informative picture of an algorithm’s performance. We show that a deep
TreeJuxtaposer: scalable tree comparison using Focus+Context with guaranteed visibility
- ACM Transactions on Graphics
, 2003
"... Structural comparison of large trees is a difficult task that is only partially supported by current visualization techniques, which are mainly designed for browsing. We present TreeJuxtaposer, a system designed to support the comparison task for large trees of several hundred thousand nodes. We int ..."
Abstract
-
Cited by 165 (6 self)
- Add to MetaCart
introduce the idea of “guaranteed visibility”, where highlighted areas are treated as landmarks that must remain visually apparent at all times. We propose a new methodology for detailed structural comparison between two trees and provide a new nearly-linear algorithm for computing the best corresponding
Logtm: Log-based transactional memory
- in HPCA
, 2006
"... Transactional memory (TM) simplifies parallel programming by guaranteeing that transactions appear to execute atomically and in isolation. Implementing these properties includes providing data version management for the simultaneous storage of both new (visible if the transaction commits) and old (r ..."
Abstract
-
Cited by 282 (11 self)
- Add to MetaCart
detection on evicted blocks and fast commit (using lazy cleanup). Second, LogTM handles aborts in (library) software with little performance penalty. Evaluations running micro- and SPLASH-2 benchmarks on a 32way multiprocessor support our decision to optimize for commit by showing that only 1
ZooKeeper: Wait-free Coordination for Internet-scale Systems
- In USENIX Annual Technical Conference
"... In this paper, we describe ZooKeeper, a service for coordinating processes of distributed applications. Since ZooKeeper is part of critical infrastructure, ZooKeeper aims to provide a simple and high performance kernel for building more complex coordination primitives at the client. It incorporates ..."
Abstract
-
Cited by 222 (9 self)
- Add to MetaCart
simple, yet powerful coordination service. The ZooKeeper interface enables a high-performance service implementation. In addition to the wait-free property, ZooKeeper provides a per client guarantee of FIFO execution of requests and linearizability for all requests that change the ZooKeeper state
The PERMIS X.509 Role Based Privilege Management Infrastructure
, 2002
"... This paper describes the output of the PERMIS project, which has developed a role based access control infrastructure that uses X.509 attribute certificates (ACs) to store the users’ roles. All access control decisions are driven by an authorization policy, which is itself stored in an X.509 attribu ..."
Abstract
-
Cited by 190 (8 self)
- Add to MetaCart
This paper describes the output of the PERMIS project, which has developed a role based access control infrastructure that uses X.509 attribute certificates (ACs) to store the users’ roles. All access control decisions are driven by an authorization policy, which is itself stored in an X.509
A PRACTICAL ALGORITHM for Exact Array Dependence Analysis
, 1992
"... A fundamental analysis step in advanced optimizing compiler (as well as many other software tools) is data dependence analysis for arrays. This means deciding if two references to an array can refer to the same element and if so, under what conditions. This information is used to deter-mine allowabl ..."
Abstract
-
Cited by 196 (0 self)
- Add to MetaCart
forj-- i to 100 do A[i, j+ 11 = A[100,j] There has been extensive study of decision methods for array data dependences [1, 2, 5, 6, 8, 15, 18, 25]. Much of this work has focused on approximate methods that are guaranteed to be fast but only com-pute exact results in (commonly occurring) special cases
Results 1 - 10
of
1,771