Sciweavers

5964 search results - page 1117 / 1193
» A theory of speculative computation
Sort
View
101
Voted
KDD
2005
ACM
165views Data Mining» more  KDD 2005»
16 years 27 days ago
Co-clustering by block value decomposition
Dyadic data matrices, such as co-occurrence matrix, rating matrix, and proximity matrix, arise frequently in various important applications. A fundamental problem in dyadic data a...
Bo Long, Zhongfei (Mark) Zhang, Philip S. Yu
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
16 years 27 days ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
222
Voted
POPL
2003
ACM
16 years 25 days ago
Discovering affine equalities using random interpretation
We present a new polynomial-time randomized algorithm for discovering affine equalities involving variables in a program. The key idea of the algorithm is to execute a code fragme...
Sumit Gulwani, George C. Necula
157
Voted
STOC
2007
ACM
239views Algorithms» more  STOC 2007»
16 years 24 days ago
Approximating minimum bounded degree spanning trees to within one of optimal
In the MINIMUM BOUNDED DEGREE SPANNING TREE problem, we are given an undirected graph with a degree upper bound Bv on each vertex v, and the task is to find a spanning tree of min...
Mohit Singh, Lap Chi Lau
STOC
2006
ACM
108views Algorithms» more  STOC 2006»
16 years 24 days ago
Extractors for a constant number of polynomially small min-entropy independent sources
We consider the problem of randomness extraction from independent sources. We construct an extractor that can extract from a constant number of independent sources of length n, ea...
Anup Rao
« Prev « First page 1117 / 1193 Last » Next »