Sciweavers

5595 search results - page 1008 / 1119
» Approximation Algorithms for Clustering Problems
Sort
View
150
Voted
ICDM
2007
IEEE
186views Data Mining» more  ICDM 2007»
15 years 11 months ago
Mining Interpretable Human Strategies: A Case Study
This paper focuses on mining human strategies by observing their actions. Our application domain is an HCI study aimed at discovering general strategies used by software users and...
Xiaoli Z. Fern, Chaitanya Komireddy, Margaret M. B...
ICDM
2007
IEEE
116views Data Mining» more  ICDM 2007»
15 years 11 months ago
Privacy-Preserving k-NN for Small and Large Data Sets
It is not surprising that there is strong interest in kNN queries to enable clustering, classification and outlierdetection tasks. However, previous approaches to privacypreservi...
Artak Amirbekyan, Vladimir Estivill-Castro
SASO
2007
IEEE
15 years 11 months ago
STORM: A Secure Overlay for P2P Reputation Management
A fundamental problem that confronts decentralized reputation systems is the design of efficient, secure and incentive-compatible mechanisms to gather trust information despite m...
Aina Ravoaja, Emmanuelle Anceaume
BVAI
2007
Springer
15 years 11 months ago
Classification with Positive and Negative Equivalence Constraints: Theory, Computation and Human Experiments
We tested the efficiency of category learning when participants are provided only with pairs of objects, known to belong either to the same class (Positive Equivalence Constraints ...
Rubi Hammer, Tomer Hertz, Shaul Hochstein, Daphna ...
HPCC
2007
Springer
15 years 11 months ago
On Pancyclicity Properties of OTIS Networks
The OTIS-Network (also referred to as two-level swapped network) is composed of n clones of an n-node original network constituting its clusters. It has received much attention due...
Mohammad R. Hoseinyfarahabady, Hamid Sarbazi-Azad
« Prev « First page 1008 / 1119 Last » Next »