Sciweavers

1025 search results - page 146 / 205
» Constraint Programming for Data Mining and Machine Learning
Sort
View
EUROPAR
1997
Springer
15 years 5 months ago
The Performance Potential of Value and Dependence Prediction
Abstract. The serialization constraints induced by the detection and enforcement of true data dependences have always been regarded as requirements for correct execution. We propos...
Mikko H. Lipasti, John Paul Shen
AIED
2009
Springer
15 years 8 months ago
Detecting the Learning Value of Items In a Randomized Problem Set
Researchers that make tutoring systems would like to know which pieces of educational content are most effective at promoting learning among their students. Randomized controlled e...
Zachary A. Pardos, Neil T. Heffernan
CLEF
2011
Springer
14 years 1 months ago
An Empirical Research: "Wikipedia Vandalism Detection using VandalSense 2.0" - Notebook for PAN at CLEF 2011
Wikipedia despite having a very small budget has been among the top ten most visited websites for over half a decade. Being this visible also generated the problem of ill intended ...
F. Gediz Aksit
ICML
2010
IEEE
15 years 3 months ago
Non-Local Contrastive Objectives
Pseudo-likelihood and contrastive divergence are two well-known examples of contrastive methods. These algorithms trade off the probability of the correct label with the probabili...
David Vickrey, Cliff Chiung-Yu Lin, Daphne Koller
SIGMOD
2007
ACM
190views Database» more  SIGMOD 2007»
16 years 2 months ago
Map-reduce-merge: simplified relational data processing on large clusters
Map-Reduce is a programming model that enables easy development of scalable parallel applications to process vast amounts of data on large clusters of commodity machines. Through ...
Hung-chih Yang, Ali Dasdan, Ruey-Lung Hsiao, Dougl...