Sciweavers

3446 search results - page 243 / 690
» A Reasoning Algorithm for pD*
Sort
View
PRL
2011
14 years 8 months ago
A Bayes-true data generator for evaluation of supervised and unsupervised learning methods
Benchmarking pattern recognition, machine learning and data mining methods commonly relies on real-world data sets. However, there are some disadvantages in using real-world data....
Janick V. Frasch, Aleksander Lodwich, Faisal Shafa...
SIGMETRICS
2011
ACM
139views Hardware» more  SIGMETRICS 2011»
14 years 8 months ago
Slick packets
Source-controlled routing has been proposed as a way to improve flexibility of future network architectures, as well as simplifying the data plane. However, if a packet specifie...
Giang T. K. Nguyen, Rachit Agarwal, Junda Liu, Mat...
ICCV
2011
IEEE
14 years 5 months ago
RECON: Scale-Adaptive Robust Estimation via Residual Consensus
In this paper, we present a novel, threshold-free robust estimation framework capable of efficiently fitting models to contaminated data. While RANSAC and its many variants have...
Rahul Raguram, Jan-Michael Frahm
CIKM
2011
Springer
14 years 5 months ago
Towards a framework for attribute retrieval
In this paper, we propose an attribute retrieval approach which extracts and ranks attributes from HTML tables. We distinguish between class attribute retrieval and instance attri...
Arlind Kopliku, Mohand Boughanem, Karen Pinel-Sauv...
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 8 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...