Sciweavers

564 search results - page 109 / 113
» Approximation algorithms for restricted Bayesian network str...
Sort
View
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
15 years 5 months ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
MM
2004
ACM
167views Multimedia» more  MM 2004»
15 years 5 months ago
Learning an image manifold for retrieval
We consider the problem of learning a mapping function from low-level feature space to high-level semantic space. Under the assumption that the data lie on a submanifold embedded ...
Xiaofei He, Wei-Ying Ma, HongJiang Zhang
102
Voted
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
16 years 25 days ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
SIGMETRICS
2008
ACM
181views Hardware» more  SIGMETRICS 2008»
15 years 10 days ago
Counter braids: a novel counter architecture for per-flow measurement
Fine-grained network measurement requires routers and switches to update large arrays of counters at very high link speed (e.g. 40 Gbps). A naive algorithm needs an infeasible amo...
Yi Lu, Andrea Montanari, Balaji Prabhakar, Sarang ...
95
Voted
SSD
2007
Springer
124views Database» more  SSD 2007»
15 years 6 months ago
Querying Objects Modeled by Arbitrary Probability Distributions
In many modern applications such as biometric identification systems, sensor networks, medical imaging, geology, and multimedia databases, the data objects are not described exact...
Christian Böhm, Peter Kunath, Alexey Pryakhin...