Sciweavers

2736 search results - page 428 / 548
» Implementable allocation rules
Sort
View
JMLR
2010
117views more  JMLR 2010»
14 years 9 months ago
Exploiting the High Predictive Power of Multi-class Subgroups
Subgroup discovery aims at finding subsets of a population whose class distribution is significantly different from the overall distribution. A number of multi-class subgroup disc...
Tarek Abudawood, Peter A. Flach
MMM
2011
Springer
244views Multimedia» more  MMM 2011»
14 years 6 months ago
Shape Stylized Face Caricatures
Facial caricatures exaggerate key features to emphasize unique structural and personality traits. It is quite a challenge to retain the identity of the original person despite the ...
Nguyen Kim Hai Le, Why Yong Peng, Golam Ashraf
123
Voted
INFOCOM
2011
IEEE
14 years 5 months ago
A cross-domain privacy-preserving protocol for cooperative firewall optimization
—Firewalls have been widely deployed on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to decide whether to accept or discard the...
Fei Chen, Bezawada Bruhadeshwar, Alex X. Liu
SIGMOD
2011
ACM
250views Database» more  SIGMOD 2011»
14 years 5 months ago
Hybrid in-database inference for declarative information extraction
In the database community, work on information extraction (IE) has centered on two themes: how to effectively manage IE tasks, and how to manage the uncertainties that arise in th...
Daisy Zhe Wang, Michael J. Franklin, Minos N. Garo...
TMC
2012
13 years 4 months ago
SenseLess: A Database-Driven White Spaces Network
The FCC ruling on Nov 4th, 2008 on white spaces has opened up the possibility of wireless network deployments over white spaces, i.e., vacant UHF TV channels. A key requirement fo...
Rohan Murty, Ranveer Chandra, Thomas Moscibroda, P...