Sciweavers

841 search results - page 41 / 169
» Generalized Projection Based M-Estimator: Theory and Applica...
Sort
View
KDD
2009
ACM
182views Data Mining» more  KDD 2009»
16 years 1 months ago
Scalable graph clustering using stochastic flows: applications to community discovery
Algorithms based on simulating stochastic flows are a simple and natural solution for the problem of clustering graphs, but their widespread use has been hampered by their lack of...
Venu Satuluri, Srinivasan Parthasarathy
SIGMETRICS
2006
ACM
121views Hardware» more  SIGMETRICS 2006»
15 years 6 months ago
Transient analysis of tree-Like processes and its application to random access systems
A new methodology to assess transient performance measures of tree-like processes is proposed by introducing the concept of tree-like processes with marked time epochs. As opposed...
Jeroen Van Velthoven, Benny Van Houdt, Chris Blond...
117
Voted
SIGIR
2010
ACM
15 years 21 days ago
SED: supervised experimental design and its application to text classification
In recent years, active learning methods based on experimental design achieve state-of-the-art performance in text classification applications. Although these methods can exploit ...
Yi Zhen, Dit-Yan Yeung
126
Voted
AUTOMATICA
2008
139views more  AUTOMATICA 2008»
15 years 19 days ago
Structured low-rank approximation and its applications
Fitting data by a bounded complexity linear model is equivalent to low-rank approximation of a matrix constructed from the data. The data matrix being Hankel structured is equival...
Ivan Markovsky
124
Voted
IDTRUST
2009
ACM
15 years 7 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol