Sciweavers

564 search results - page 102 / 113
» Approximation algorithms for restricted Bayesian network str...
Sort
View
GECCO
2007
Springer
162views Optimization» more  GECCO 2007»
15 years 6 months ago
Some novel locality results for the blob code spanning tree representation
The Blob Code is a bijective tree code that represents each tree on n labelled vertices as a string of n − 2 vertex labels. In recent years, several researchers have deployed th...
Tim Paulden, David K. Smith
123
Voted
CORR
2011
Springer
243views Education» more  CORR 2011»
14 years 7 months ago
Distributed Estimation and False Data Detection with Application to Power Networks
This work presents a distributed method for control centers in a power network to estimate the operating condition of the power plant, and to ultimately determine the occurrence o...
Fabio Pasqualetti, Ruggero Carli, Francesco Bullo
79
Voted
KDD
2010
ACM
188views Data Mining» more  KDD 2010»
15 years 2 months ago
Inferring networks of diffusion and influence
Information diffusion and virus propagation are fundamental processes talking place in networks. While it is often possible to directly observe when nodes become infected, observi...
Manuel Gomez-Rodriguez, Jure Leskovec, Andreas Kra...
128
Voted
WWW
2011
ACM
14 years 7 months ago
Network bucket testing
Bucket testing, also known as A/B testing, is a practice that is widely used by on-line sites with large audiences: in a simple version of the methodology, one evaluates a new fea...
Lars Backstrom, Jon M. Kleinberg
113
Voted
KDD
2009
ACM
191views Data Mining» more  KDD 2009»
16 years 1 months ago
Scalable pseudo-likelihood estimation in hybrid random fields
Learning probabilistic graphical models from high-dimensional datasets is a computationally challenging task. In many interesting applications, the domain dimensionality is such a...
Antonino Freno, Edmondo Trentin, Marco Gori