Sciweavers

11665 search results - page 2025 / 2333
» Human computing for EDA
Sort
View
POPL
2009
ACM
16 years 5 months ago
Wild control operators
Linguists seek to understand the semantics of expressions in human languages. Taking a computational point of view, there are many natural language expressions--operators in the w...
Chris Barker
PERCOM
2009
ACM
16 years 5 months ago
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
Abstract--"Secure Device Pairing" is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptib...
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
KDD
2006
ACM
122views Data Mining» more  KDD 2006»
16 years 5 months ago
Measuring and extracting proximity in networks
Measuring distance or some other form of proximity between objects is a standard data mining tool. Connection subgraphs were recently proposed as a way to demonstrate proximity be...
Yehuda Koren, Stephen C. North, Chris Volinsky
KDD
2005
ACM
142views Data Mining» more  KDD 2005»
16 years 5 months ago
Towards exploratory test instance specific algorithms for high dimensional classification
In an interactive classification application, a user may find it more valuable to develop a diagnostic decision support method which can reveal significant classification behavior...
Charu C. Aggarwal
KDD
2005
ACM
117views Data Mining» more  KDD 2005»
16 years 5 months ago
Rule extraction from linear support vector machines
We describe an algorithm for converting linear support vector machines and any other arbitrary hyperplane-based linear classifiers into a set of non-overlapping rules that, unlike...
Glenn Fung, Sathyakama Sandilya, R. Bharat Rao
« Prev « First page 2025 / 2333 Last » Next »