Sciweavers

1310 search results - page 235 / 262
» Learning the k in k-means
Sort
View
120
Voted
CIKM
2011
Springer
14 years 19 days ago
Exploiting longer cycles for link prediction in signed networks
We consider the problem of link prediction in signed networks. Such networks arise on the web in a variety of ways when users can implicitly or explicitly tag their relationship w...
Kai-Yang Chiang, Nagarajan Natarajan, Ambuj Tewari...
144
Voted
CVPR
2003
IEEE
16 years 2 months ago
Activity Recognition Using the Dynamics of the Configuration of Interacting Objects
Monitoring activities using video data is an important surveillance problem. A special scenario is to learn the pattern of normal activities and detect abnormal events from a very...
Namrata Vaswani, Amit K. Roy Chowdhury, Rama Chell...
118
Voted
WWW
2006
ACM
16 years 1 months ago
Reappraising cognitive styles in adaptive web applications
The mechanisms for personalisation used in web applications are currently the subject of much debate amongst researchers from many diverse subject areas. One of the most contempor...
Adam Moore, Elizabeth J. Brown, Helen Ashman, Tim ...
SIGCSE
2009
ACM
194views Education» more  SIGCSE 2009»
16 years 1 months ago
Integrating pedagogical code reviews into a CS 1 course: an empirical study
Formal code inspections are employed by teams of professional software engineers to identify software defects and improve the quality of software. After reviewing a piece of code ...
Christopher D. Hundhausen, Anukrati Agrawal, Dana ...
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
16 years 1 months ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov