Sciweavers

9284 search results - page 1853 / 1857
» Knowledge State Algorithms
Sort
View
119
Voted
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
14 years 4 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
151
Voted
CIKM
2011
Springer
14 years 1 months ago
Simultaneous joint and conditional modeling of documents tagged from two perspectives
This paper explores correspondence and mixture topic modeling of documents tagged from two different perspectives. There has been ongoing work in topic modeling of documents with...
Pradipto Das, Rohini K. Srihari, Yun Fu
234
Voted
DAC
2011
ACM
14 years 1 months ago
Fault-tolerant 3D clock network
Clock tree synthesis is one of the most important and challenging problems in 3D ICs. The clock signals have to be delivered by through-silicon vias (TSVs) to different tiers with...
Chiao-Ling Lung, Yu-Shih Su, Shih-Hsiu Huang, Yiyu...
CVPR
2008
IEEE
15 years 2 months ago
Tracking distributions with an overlap prior
Recent studies have shown that embedding similarity/dissimilarity measures between distributions in the variational level set framework can lead to effective object segmentation/t...
Ismail Ben Ayed, Shuo Li, Ian G. Ross
WSDM
2012
ACM
296views Data Mining» more  WSDM 2012»
13 years 9 months ago
Inferring social ties across heterogenous networks
It is well known that different types of social ties have essentially different influence between people. However, users in online social networks rarely categorize their contact...
Jie Tang, Tiancheng Lou, Jon M. Kleinberg
« Prev « First page 1853 / 1857 Last » Next »