Sciweavers

1274 search results - page 224 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
SAC
2006
ACM
15 years 3 months ago
A privacy preserving web recommender system
In this paper we propose a recommender system that helps users to navigate though the Web by providing dynamically generated links to pages that have not yet been visited and are ...
Ranieri Baraglia, Claudio Lucchese, Salvatore Orla...
DATE
2009
IEEE
202views Hardware» more  DATE 2009»
15 years 4 months ago
Design as you see FIT: System-level soft error analysis of sequential circuits
Soft errors in combinational and sequential elements of digital circuits are an increasing concern as a result of technology scaling. Several techniques for gate and latch hardeni...
Daniel Holcomb, Wenchao Li, Sanjit A. Seshia
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
13 years 3 days ago
Fast bregman divergence NMF using taylor expansion and coordinate descent
Non-negative matrix factorization (NMF) provides a lower rank approximation of a matrix. Due to nonnegativity imposed on the factors, it gives a latent structure that is often mor...
Liangda Li, Guy Lebanon, Haesun Park
99
Voted
WSDM
2012
ACM
283views Data Mining» more  WSDM 2012»
13 years 5 months ago
The life and death of online groups: predicting group growth and longevity
We pose a fundamental question in understanding how to identify and design successful communities: What factors predict whether a community will grow and survive in the long term?...
Sanjay Ram Kairam, Dan J. Wang, Jure Leskovec
87
Voted
ICCV
2009
IEEE
1335views Computer Vision» more  ICCV 2009»
16 years 2 months ago
Top-Down Color Attention for Object Recognition
Generally the bag-of-words based image representation follows a bottom-up paradigm. The subsequent stages of the process: feature detection, feature description, vocabulary cons...
Fahad Shahbaz Khan, Joost van de Weijer, Maria Van...