Sciweavers

5948 search results - page 1169 / 1190
» Computing Robust Counter-Strategies
Sort
View
CIKM
2009
Springer
15 years 1 months ago
Improving binary classification on text problems using differential word features
We describe an efficient technique to weigh word-based features in binary classification tasks and show that it significantly improves classification accuracy on a range of proble...
Justin Martineau, Tim Finin, Anupam Joshi, Shamit ...
DIALM
2007
ACM
178views Algorithms» more  DIALM 2007»
15 years 1 months ago
Near-Optimal Compression of Probabilistic Counting Sketches for Networking Applications
Sketches--data structures for probabilistic, duplicate insensitive counting--are central building blocks of a number of recently proposed network protocols, for example in the con...
Björn Scheuermann, Martin Mauve
KDD
2010
ACM
310views Data Mining» more  KDD 2010»
15 years 1 months ago
An integrated machine learning approach to stroke prediction
Stroke is the third leading cause of death and the principal cause of serious long-term disability in the United States. Accurate prediction of stroke is highly valuable for early...
Aditya Khosla, Yu Cao, Cliff Chiung-Yu Lin, Hsu-Ku...
EVOW
2007
Springer
15 years 1 months ago
Scale Invariance for Evolved Interest Operators
Abstract. This work presents scale invariant region detectors that apply evolved operators to extract an interest measure. We evaluate operators using their repeatability rate, and...
Leonardo Trujillo, Gustavo Olague
ATAL
2006
Springer
15 years 1 months ago
Deploying a personalized time management agent
We report on our ongoing practical experience in designing, implementing, and deploying PTIME, a personalized agent for time management and meeting scheduling in an open, multi-ag...
Pauline Berry, Bart Peintner, Ken Conley, Melinda ...
« Prev « First page 1169 / 1190 Last » Next »