Sciweavers

11665 search results - page 2025 / 2333
» Human computing for EDA
Sort
View
POPL
2009
ACM
15 years 12 months ago
Wild control operators
Linguists seek to understand the semantics of expressions in human languages. Taking a computational point of view, there are many natural language expressions--operators in the w...
Chris Barker
80
Voted
PERCOM
2009
ACM
15 years 11 months ago
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
Abstract--"Secure Device Pairing" is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptib...
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
KDD
2006
ACM
122views Data Mining» more  KDD 2006»
15 years 11 months ago
Measuring and extracting proximity in networks
Measuring distance or some other form of proximity between objects is a standard data mining tool. Connection subgraphs were recently proposed as a way to demonstrate proximity be...
Yehuda Koren, Stephen C. North, Chris Volinsky
KDD
2005
ACM
142views Data Mining» more  KDD 2005»
15 years 11 months ago
Towards exploratory test instance specific algorithms for high dimensional classification
In an interactive classification application, a user may find it more valuable to develop a diagnostic decision support method which can reveal significant classification behavior...
Charu C. Aggarwal
KDD
2005
ACM
117views Data Mining» more  KDD 2005»
15 years 11 months ago
Rule extraction from linear support vector machines
We describe an algorithm for converting linear support vector machines and any other arbitrary hyperplane-based linear classifiers into a set of non-overlapping rules that, unlike...
Glenn Fung, Sathyakama Sandilya, R. Bharat Rao
« Prev « First page 2025 / 2333 Last » Next »