Sciweavers

17582 search results - page 3399 / 3517
» From Distributed Sequential Computing to Distributed Paralle...
Sort
View
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
15 years 7 months ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
CCS
2006
ACM
15 years 6 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
97
Voted
ECAI
2006
Springer
15 years 6 months ago
A Real Generalization of Discrete AdaBoost
Scaling discrete AdaBoost to handle real-valued weak hypotheses has often been done under the auspices of convex optimization, but little is generally known from the original boost...
Richard Nock, Frank Nielsen
125
Voted
EDBT
2010
ACM
152views Database» more  EDBT 2010»
15 years 6 months ago
Feedback-based annotation, selection and refinement of schema mappings for dataspaces
The specification of schema mappings has proved to be time and resource consuming, and has been recognized as a critical bottleneck to the large scale deployment of data integrati...
Khalid Belhajjame, Norman W. Paton, Suzanne M. Emb...
137
Voted
IJCAI
1989
15 years 3 months ago
Comparing the Conceptual Systems of Experts
The knowledge to be acquired for the development of knowledge based systems is often distributed across a group of experts rather than available for elicitation from a single expe...
Brian R. Gaines, Mildred L. G. Shaw
« Prev « First page 3399 / 3517 Last » Next »