Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,449,046 papers from all fields of science
Search
Sign In
Create Free Account
VC dimension
Known as:
VCD (disambiguation)
, VC
, VC-dimension
Expand
In statistical learning theory and computational learning theory, the VC dimension (for Vapnik–Chervonenkis dimension) is a measure of the capacity…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Alexey Chervonenkis
Algorithm
Algorithmic inference
Art gallery problem
Expand
Broader (2)
Computational learning theory
Statistical classification
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality
Xuehu Yan
,
Shen Wang
,
X. Niu
,
Ching-Nung Yang
Digit. Signal Process.
2015
Corpus ID: 36078557
Review
2013
Review
2013
Intra compression efficiency in VP9 and HEVC
M. Sharabayko
,
O. G. Ponomarev
,
R. Chernyak
2013
Corpus ID: 63539918
The amount of video data stored on local devices or transmitted over the networks is permanently increased. The emerging of a…
Expand
Review
2009
Review
2009
Syndication in venture capital
M. Jääskeläinen
2009
Corpus ID: 40263250
OF DOCTORAL DISSERTATION HELSINKI UNIVERSITY OF TECHNOLOGY P.O. BOX 1000, FI-02015 TKK http://www.tkk.fi Author Mikko Samuel J…
Expand
Highly Cited
2008
Highly Cited
2008
TDM Virtual-Circuit Configuration for Network-on-Chip
Zhonghai Lu
,
A. Jantsch
IEEE Transactions on Very Large Scale Integration…
2008
Corpus ID: 599262
In network-on-chip (NoC), time-division-multiplexing (TDM) virtual circuits (VCs) have been proposed to satisfy the quality-of…
Expand
Highly Cited
2008
Highly Cited
2008
Color Visual Cryptography Scheme Using Meaningful Shares
Hsien-Chu Wu
,
Hao-Cheng Wang
,
Ruihua Yu
Eighth International Conference on Intelligent…
2008
Corpus ID: 5200590
Visual cryptography (VC) schemes hide the secret image into two or more images which are called shares. The secret image can be…
Expand
2004
2004
Virtual channel designs for guaranteeing bandwidth in asynchronous network-on-chip
T. Bjerregaard
,
J. Sparsø
Proceedings Norchip Conference, .
2004
Corpus ID: 6402224
Logically separate channels sharing a physical link, so called virtual channels (VCs), have wide spread uses in multicomputer…
Expand
2004
2004
An /spl epsiv/-margin nonlinear classifier based on fuzzy if-then rules
Jacek M. Łęski
IEEE Transactions on Systems, Man, and…
2004
Corpus ID: 6211767
This paper introduces a new classifier design methods that are based on a modification of the classical Ho-Kashyap procedure…
Expand
Highly Cited
2000
Highly Cited
2000
Internets in the sky: capacity of 3D wireless networks
P. Gupta
,
P. Kumar
Proceedings of the 39th IEEE Conference on…
2000
Corpus ID: 61322985
Consider n nodes located in a sphere of volume V m/sup 3/, each capable of transmitting at a data rate of W bits/sec. Under a…
Expand
1991
1991
Probably Approximate Learning of Sets and Functions
B. Natarajan
SIAM journal on computing (Print)
1991
Corpus ID: 28090658
Probably approximate learning is the inference of a set (also called a concept) from a small number of sample points, under the…
Expand
1977
1977
Acoustic-reflex effects on the input admittance and transfer characteristics of the human middle-ear
W. M. Rabinowitz
1977
Corpus ID: 34347393
In the past 50 years many kinds of experiments on animals have demonstrated that muscles in the middle-ear contract in response…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required