Sciweavers

ECWEB
2011
Springer
233views ECommerce» more  ECWEB 2011»
12 years 4 months ago
Rating Elicitation Strategies for Collaborative Filtering
The accuracy of collaborative filtering recommender systems largely depends on two factors: the quality of the recommendation algorithm and the nature of the available item rating...
Mehdi Elahi, Valdemaras Repsys, Francesco Ricci
CP
2011
Springer
12 years 4 months ago
CP Models for Maximum Common Subgraph Problems
The distance between two graphs is usually defined by means of the size of a largest common subgraph. This common subgraph may be an induced subgraph, obtained by removing nodes, ...
Samba Ndojh Ndiaye, Christine Solnon
CADE
2011
Springer
12 years 4 months ago
Compression of Propositional Resolution Proofs via Partial Regularization
This paper describes two algorithms for the compression of propositional resolution proofs. The first algorithm, RecyclePivotsWithIntersection, performs partial regularization, re...
Pascal Fontaine, Stephan Merz, Bruno Woltzenlogel ...
ALT
2011
Springer
12 years 4 months ago
Deviations of Stochastic Bandit Regret
This paper studies the deviations of the regret in a stochastic multi-armed bandit problem. When the total number of plays n is known beforehand by the agent, Audibert et al. (2009...
Antoine Salomon, Jean-Yves Audibert
AAAI
2011
12 years 4 months ago
Optimal Envy-Free Cake Cutting
We consider the problem of fairly dividing a heterogeneous divisible good among agents with different preferences. Previous work has shown that envy-free allocations, i.e., where...
Yuga J. Cohler, John K. Lai, David C. Parkes, Arie...
SDM
2011
SIAM
203views Data Mining» more  SDM 2011»
12 years 7 months ago
Interpreting and Unifying Outlier Scores
Outlier scores provided by different outlier models differ widely in their meaning, range, and contrast between different outlier models and, hence, are not easily comparable o...
Hans-Peter Kriegel, Peer Kröger, Erich Schube...
PREMI
2011
Springer
12 years 7 months ago
Feature Set Selection for On-Line Signatures Using Selection of Regression Variables
Abstract. In this paper we approach feature set selection phase in signature verification by applying the method for selection of regression variables based on Mallows Cp criterio...
Desislava Boyadzieva, Georgi Gluhchev
PAM
2011
Springer
12 years 7 months ago
Internet Censorship in China: Where Does the Filtering Occur?
China filters Internet traffic in and out of the country. In order to circumvent the firewall, it is helpful to know where the filtering occurs. In this work, we explore the AS-...
Xueyang Xu, Zhuoqing Morley Mao, J. Alex Halderman
JAIR
2011
88views more  JAIR 2011»
12 years 7 months ago
From "Identical" to "Similar": Fusing Retrieved Lists Based on Inter-Document Similarities
We present a novel approach to fusing document lists that are retrieved in response to a query. Our approach is based on utilizing information induced from inter-document similarit...
Anna Khudyak Kozorovitzky, Oren Kurland
ICANN
2011
Springer
12 years 8 months ago
Learning from Multiple Annotators with Gaussian Processes
Abstract. In many supervised learning tasks it can be costly or infeasible to obtain objective, reliable labels. We may, however, be able to obtain a large number of subjective, po...
Perry Groot, Adriana Birlutiu, Tom Heskes