Sciweavers

499 search results - page 65 / 100
» A Study on Latent Vulnerabilities
Sort
View
ICDM
2010
IEEE
167views Data Mining» more  ICDM 2010»
14 years 10 months ago
Averaged Stochastic Gradient Descent with Feedback: An Accurate, Robust, and Fast Training Method
On large datasets, the popular training approach has been stochastic gradient descent (SGD). This paper proposes a modification of SGD, called averaged SGD with feedback (ASF), tha...
Xu Sun, Hisashi Kashima, Takuya Matsuzaki, Naonori...
120
Voted
NAACL
2010
14 years 10 months ago
Appropriately Handled Prosodic Breaks Help PCFG Parsing
This paper investigates using prosodic information in the form of ToBI break indexes for parsing spontaneous speech. We revisit two previously studied approaches, one that hurt pa...
Zhongqiang Huang, Mary P. Harper
149
Voted
WAW
2010
Springer
235views Algorithms» more  WAW 2010»
14 years 10 months ago
Multiplicative Attribute Graph Model of Real-World Networks
Large scale real-world network data such as social and information networks are ubiquitous. The study of such social and information networks seeks to find patterns and explain th...
Myunghwan Kim, Jure Leskovec
120
Voted
INFOCOM
2012
IEEE
13 years 2 months ago
Sampling directed graphs with random walks
Abstract—Despite recent efforts to characterize complex networks such as citation graphs or online social networks (OSNs), little attention has been given to developing tools tha...
Bruno F. Ribeiro, Pinghui Wang, Fabricio Murai, Do...
122
Voted
SDM
2012
SIAM
233views Data Mining» more  SDM 2012»
13 years 2 months ago
On Finding Joint Subspace Boolean Matrix Factorizations
Finding latent factors of the data using matrix factorizations is a tried-and-tested approach in data mining. But finding shared factors over multiple matrices is more novel prob...
Pauli Miettinen