Sciweavers

1595 search results - page 277 / 319
» A hierarchical clustering algorithm based on the Hungarian m...
Sort
View
SAC
2010
ACM
15 years 7 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
ICSE
2012
IEEE-ACM
13 years 4 months ago
Synthesizing API usage examples
Abstract—Key program interfaces are sometimes documented with usage examples: concrete code snippets that characterize common use cases for a particular data type. While such doc...
Raymond P. L. Buse, Westley Weimer
ICIP
2004
IEEE
16 years 3 months ago
Stochastic modeling of volume images with a 3-d hidden markov model
Over the years, researchers in the image analysis community have successfully used various statistical modeling methods to segment, classify, and annotate digital images. In this ...
Jia Li, Dhiraj Joshi, James Ze Wang
ICPR
2000
IEEE
16 years 3 months ago
On Gaussian Radial Basis Function Approximations: Interpretation, Extensions, and Learning Strategies
In this paper we focus on an interpretation of Gaussian radial basis functions (GRBF) which motivates extensions and learning strategies. Specifically, we show that GRBF regressio...
Mário A. T. Figueiredo
WWW
2004
ACM
16 years 2 months ago
Distributed community crawling
The massive distribution of the crawling task can lead to inefficient exploration of the same portion of the Web. We propose a technique to guide crawlers exploration based on the...
Fabrizio Costa, Paolo Frasconi