Sciweavers

1232 search results - page 243 / 247
» Evaluating role mining algorithms
Sort
View
CVPR
2011
IEEE
15 years 18 days ago
RUNE-Tag: a High Accuracy Fiducial Marker with Strong Occlusion Resilience
Over the last decades fiducial markers have provided widely adopted tools to add reliable model-based features into an otherwise general scene. Given their central role in many c...
Filippo Bergamasco, Andrea Albarelli, Andrea Torse...
WEBI
2009
Springer
15 years 11 months ago
Rank Aggregation Based Text Feature Selection
Filtering feature selection method (filtering method, for short) is a well-known feature selection strategy in pattern recognition and data mining. Filtering method outperforms ot...
Ou Wu, Haiqiang Zuo, Mingliang Zhu, Weiming Hu, Ju...
MLDM
2005
Springer
15 years 10 months ago
Using Clustering to Learn Distance Functions for Supervised Similarity Assessment
Assessing the similarity between objects is a prerequisite for many data mining techniques. This paper introduces a novel approach to learn distance functions that maximizes the c...
Christoph F. Eick, Alain Rouhana, Abraham Bagherje...
SIGIR
2012
ACM
13 years 6 months ago
Cognos: crowdsourcing search for topic experts in microblogs
Finding topic experts on microblogging sites with millions of users, such as Twitter, is a hard and challenging problem. In this paper, we propose and investigate a new methodolog...
Saptarshi Ghosh, Naveen Kumar Sharma, Fabrí...
ICSE
2012
IEEE-ACM
13 years 6 months ago
WitchDoctor: IDE support for real-time auto-completion of refactorings
—Integrated Development Environments (IDEs) have come to perform a wide variety of tasks on behalf of the programmer, refactoring being a classic example. These operations have u...
Stephen R. Foster, William G. Griswold, Sorin Lern...