Sciweavers

41938 search results - page 8256 / 8388
» Complex Systems Modeling
Sort
View
151
Voted
USS
2010
15 years 15 days ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
159
Voted
WISE
2010
Springer
15 years 14 days ago
Neighborhood-Restricted Mining and Weighted Application of Association Rules for Recommenders
Abstract. Association rule mining algorithms such as Apriori were originally developed to automatically detect patterns in sales transactions and were later on also successfully ap...
Fatih Gedikli, Dietmar Jannach
240
Voted
EDM
2009
184views Data Mining» more  EDM 2009»
15 years 13 days ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
127
Voted
BC
2010
163views more  BC 2010»
15 years 2 days ago
Action and behavior: a free-energy formulation
We have previously tried to explain perceptual inference and learning under a free-energy principle that pursues Helmholtz's agenda to understand the brain in terms of energy ...
Karl J. Friston, Jean Daunizeau, James Kilner, Ste...
125
Voted
CVPR
2011
IEEE
14 years 10 months ago
Face Image Retrieval by Shape Manipulation
Current face image retrieval methods achieve impressive results, but lack efficient ways to refine the search, particularly for geometric face attributes. Users cannot easily ...
Brandon Smith, Shengqi Zhu, Li Zhang
« Prev « First page 8256 / 8388 Last » Next »