Sciweavers

536 search results - page 60 / 108
» Evaluating Metrical Phonology - a Computational- Empirical A...
Sort
View
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
15 years 10 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
ICDIM
2007
IEEE
15 years 7 months ago
Pattern-based decision tree construction
Learning classifiers has been studied extensively the last two decades. Recently, various approaches based on patterns (e.g., association rules) that hold within labeled data hav...
Dominique Gay, Nazha Selmaoui, Jean-Françoi...
SIAMSC
2008
193views more  SIAMSC 2008»
15 years 1 months ago
Exact and Approximate Sparse Solutions of Underdetermined Linear Equations
Abstract. In this paper, we empirically investigate the NP-hard problem of finding sparsest solutions to linear equation systems, i.e., solutions with as few nonzeros as possible. ...
Sadegh Jokar, Marc E. Pfetsch
PRICAI
2010
Springer
14 years 11 months ago
Partial Weighted MaxSAT for Optimal Planning
Abstract. We consider the problem of computing optimal plans for propositional planning problems with action costs. In the spirit of leveraging advances in general-purpose automate...
Nathan Robinson, Charles Gretton, Duc Nghia Pham, ...
PDP
2009
IEEE
15 years 8 months ago
Byte-Range Asynchronous Locking in Distributed Settings
This paper investigate a mutual exclusion algorithm on distributed systems. We introduce a new algorithm based on the Naimi-Trehel algorithm, taking advantage of the distributed a...
Martin Quinson, Flavien Vernier