Sciweavers

Share
IJON
2006
180views more  IJON 2006»
8 years 3 months ago
Nonnegative independent component analysis based on minimizing mutual information technique
A novel neural network technique for nonnegative independent component analysis is proposed in this letter. Compared with other algorithms, this method can work efficiently even w...
Chun-Hou Zheng, De-Shuang Huang, Zhan-Li Sun, Mich...
CORR
2008
Springer
125views Education» more  CORR 2008»
8 years 3 months ago
Cross-Layer Link Adaptation Design for Relay Channels with Cooperative ARQ Protocol
The cooperative automatic repeat request (C-ARQ) is a link layer relaying protocol which exploits the spatial diversity and allows the relay node to retransmit the source data pac...
Morteza Mardani, Jalil S. Harsini, Farshad Lahouti
DBSEC
2008
365views Database» more  DBSEC 2008»
8 years 4 months ago
Secure Construction of Contingency Tables from Distributed Data
Abstract. Contingency tables are widely used in many fields to analyze the relationship or infer the association between two or more variables. Indeed, due to their simplicity and ...
Haibing Lu, Xiaoyun He, Jaideep Vaidya, Nabil R. A...
LREC
2010
175views Education» more  LREC 2010»
8 years 4 months ago
The Creation of a Large-Scale LFG-Based Gold Parsebank
Systems for syntactically parsing sentences have long been recognized as a priority in Natural Language Processing. Statistics-based systems require large amounts of high quality ...
Alexis Baird, Christopher R. Walker
EDBT
2000
ACM
8 years 7 months ago
Temporal View Self-Maintenance
Warehouse view self-maintenance refers to maintaining materialized views at a data warehouse without accessing source data. Self-maintenance has been studied for nontemporal views...
Jun Yang 0001, Jennifer Widom
PEPM
2007
ACM
8 years 9 months ago
Bidirectional interpretation of XQuery
XQuery is a powerful functional language to query XML data. This paper presents a bidirectional interpretation of XQuery to address the problem of updating XML data through materi...
Dongxi Liu, Zhenjiang Hu, Masato Takeichi
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
8 years 10 months ago
Set-Based Boosting for Instance-Level Transfer
—The success of transfer to improve learning on a target task is highly dependent on the selected source data. Instance-based transfer methods reuse data from the source tasks to...
Eric Eaton, Marie desJardins
CSFW
2009
IEEE
8 years 10 months ago
Updatable Security Views
Security views are a flexible and effective mechanism for controlling access to confidential information. Rather than allowing untrusted users to access source data directly, th...
J. Nathan Foster, Benjamin C. Pierce, Steve Zdance...
SIGMOD
2005
ACM
150views Database» more  SIGMOD 2005»
9 years 3 months ago
Incremental Maintenance of Path Expression Views
Caching data by maintaining materialized views typically requires updating the cache appropriately to reflect dynamic source updates. Extensive research has addressed the problem ...
Arsany Sawires, Jun'ichi Tatemura, Oliver Po, Divy...
books