Sciweavers

1350 search results - page 75 / 270
» Generalized Committed Choice
Sort
View
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
15 years 2 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa
SIGCSE
2006
ACM
211views Education» more  SIGCSE 2006»
15 years 10 months ago
Multimodal communication in the classroom: what does it mean for us?
Experimentation has shown that in-class educational technologies, by permitting anonymous, authored participation, can dramatically alter student communications in the classroom. ...
Tamara Denning, William G. Griswold, Beth Simon, M...
AIPS
2009
15 years 5 months ago
Enhancing the Context-Enhanced Additive Heuristic with Precedence Constraints
Recently, Helmert and Geffner proposed the context-enhanced additive heuristic, where fact costs are evaluated relative to context states that arise from achieving first a pivot c...
Dunbo Cai, Jörg Hoffmann, Malte Helmert
ICASSP
2010
IEEE
15 years 4 months ago
Nonlinear kernel backprojection for computed tomography
In this paper, we propose a kernel backprojection method for computed tomography. The classical backprojection method estimates an unknown pixel value by the summation of the proj...
Hiroyuki Takeda, Peyman Milanfar
WWW
2006
ACM
16 years 5 months ago
Detecting online commercial intention (OCI)
Understanding goals and preferences behind a user's online activities can greatly help information providers, such as search engine and E-Commerce web sites, to personalize c...
Honghua (Kathy) Dai, Lingzhi Zhao, Zaiqing Nie, Ji...