Sciweavers

908 search results - page 138 / 182
» Additional methods when using email for teaching
Sort
View
70
Voted
KDD
1998
ACM
120views Data Mining» more  KDD 1998»
15 years 1 months ago
Large Datasets Lead to Overly Complex Models: An Explanation and a Solution
This paper explores unexpected results that lie at the intersection of two common themes in the KDD community: large datasets and the goal of building compact models. Experiments ...
Tim Oates, David Jensen
KDD
1994
ACM
113views Data Mining» more  KDD 1994»
15 years 1 months ago
Exploration of Simulation Experiments by Discovery
: Weexemplify in this paper, howa discovery system is applied to the analysis of simulation experimentsin practical political planning, andshowwhatkind of newknowledgecan be discov...
Willi Klösgen
EUROPAR
2004
Springer
15 years 1 months ago
Imprecise Exceptions in Distributed Parallel Components
Abstract. Modern microprocessors have sacrificed the exactness of exceptions for improved performance long ago. This is a side effect of reordering instructions so that the micropr...
Kostadin Damevski, Steven G. Parker
ESORICS
2006
Springer
15 years 1 months ago
Privacy-Preserving Queries on Encrypted Data
Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, perf...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
ICCV
1995
IEEE
15 years 1 months ago
FORMS: A Flexible Object Recognition and Modelling System
Abstract. We describe a flexible object recognition and modelling system (FORMS) which represents and recognizes animate objects from their silhouettes. This consists of a model fo...
Song Chun Zhu, Alan L. Yuille