Sciweavers

5964 search results - page 1115 / 1193
» A theory of speculative computation
Sort
View
STOC
2009
ACM
163views Algorithms» more  STOC 2009»
16 years 1 months ago
Non-monotone submodular maximization under matroid and knapsack constraints
Submodular function maximization is a central problem in combinatorial optimization, generalizing many important problems including Max Cut in directed/undirected graphs and in hy...
Jon Lee, Vahab S. Mirrokni, Viswanath Nagarajan, M...
95
Voted
KDD
2009
ACM
174views Data Mining» more  KDD 2009»
16 years 1 months ago
Audience selection for on-line brand advertising: privacy-friendly social network targeting
This paper describes and evaluates privacy-friendly methods for extracting quasi-social networks from browser behavior on user-generated content sites, for the purpose of finding ...
Foster J. Provost, Brian Dalessandro, Rod Hook, Xi...
KDD
2009
ACM
239views Data Mining» more  KDD 2009»
16 years 1 months ago
Tell me something I don't know: randomization strategies for iterative data mining
There is a wide variety of data mining methods available, and it is generally useful in exploratory data analysis to use many different methods for the same dataset. This, however...
Heikki Mannila, Kai Puolamäki, Markus Ojala, ...
KDD
2009
ACM
245views Data Mining» more  KDD 2009»
16 years 1 months ago
Mining rich session context to improve web search
User browsing information, particularly their non-search related activity, reveals important contextual information on the preferences and the intent of web users. In this paper, ...
Guangyu Zhu, Gilad Mishne
179
Voted
PODS
2009
ACM
113views Database» more  PODS 2009»
16 years 1 months ago
Relative information completeness
The paper investigates the question of whether a partially closed database has complete information to answer a query. In practice an enterprise often maintains master data Dm, a ...
Wenfei Fan, Floris Geerts
« Prev « First page 1115 / 1193 Last » Next »