Sciweavers

2131 search results - page 426 / 427
» A computational approximation to the AIXI model
Sort
View
TVCG
2011
163views more  TVCG 2011»
13 years 1 months ago
Scan-Based Volume Animation Driven by Locally Adaptive Articulated Registrations
—This paper describes a complete system to create anatomically accurate example-based volume deformation and animation of articulated body regions, starting from multiple in vivo...
Taehyun Rhee, John P. Lewis, Ulrich Neumann, Krish...
WWW
2011
ACM
13 years 1 months ago
Limiting the spread of misinformation in social networks
In this work, we study the notion of competing campaigns in a social network. By modeling the spread of influence in the presence of competing campaigns, we provide necessary too...
Ceren Budak, Divyakant Agrawal, Amr El Abbadi
SIAMMAX
2010
164views more  SIAMMAX 2010»
13 years 27 days ago
Uniqueness of Low-Rank Matrix Completion by Rigidity Theory
The problem of completing a low-rank matrix from a subset of its entries is often encountered in the analysis of incomplete data sets exhibiting an underlying factor model with app...
Amit Singer, Mihai Cucuringu
SIGMOD
2011
ACM
241views Database» more  SIGMOD 2011»
12 years 9 months ago
Neighborhood based fast graph search in large networks
Complex social and information network search becomes important with a variety of applications. In the core of these applications, lies a common and critical problem: Given a labe...
Arijit Khan, Nan Li, Xifeng Yan, Ziyu Guan, Supriy...
IACR
2011
87views more  IACR 2011»
12 years 5 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao