Sciweavers

1455 search results - page 169 / 291
» Exploiting Myopic Learning
Sort
View
MLDM
1999
Springer
15 years 8 months ago
Independent Feature Analysis for Image Retrieval
Content-based image retrieval methods based on the Euclidean metric expect the feature space to be isotropic. They su€er from unequal di€erential relevance of features in comput...
Jing Peng, Bir Bhanu
CRYPTO
1995
Springer
135views Cryptology» more  CRYPTO 1995»
15 years 7 months ago
Committed Oblivious Transfer and Private Multi-Party Computation
Abstract. In this paper we present an eficient protocol for “Committed Oblivious Transfer” to perform oblivious transfer on committed bits: suppose Alice is committed to bits 0...
Claude Crépeau, Jeroen van de Graaf, Alain ...
KDD
1995
ACM
85views Data Mining» more  KDD 1995»
15 years 7 months ago
Estimating the Robustness of Discovered Knowledge
This paper introduces a new measurement, robustness, to measure the quality of machine-discovered knowledge from real-world databases that change over time. A piece of knowledge i...
Chun-Nan Hsu, Craig A. Knoblock
CIKM
2008
Springer
15 years 6 months ago
Classifying networked entities with modularity kernels
Statistical machine learning techniques for data classification usually assume that all entities are i.i.d. (independent and identically distributed). However, real-world entities...
Dell Zhang, Robert Mao
153
Voted
ECML
2006
Springer
15 years 6 months ago
Distributional Features for Text Categorization
Abstract-- Text categorization is the task of assigning predefined categories to natural language text. With the widely used `bag of words' representation, previous researches...
Xiao-Bing Xue, Zhi-Hua Zhou