Sciweavers

2299 search results - page 37 / 460
» Logical Data Expiration
Sort
View
99
Voted
SAINT
2003
IEEE
15 years 5 months ago
A Generalized Target-Driven Cache Replacement Policy for Mobile Environments
Caching frequently accessed data items on the client side is an effective technique to improve the system performance in wireless networks. Due to cache size limitations, cache re...
Liangzhong Yin, Guohong Cao, Ying Cai
111
Voted
CCS
2008
ACM
15 years 2 months ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton
94
Voted
DBPL
2001
Springer
118views Database» more  DBPL 2001»
15 years 5 months ago
On Monotone Data Mining Languages
Abstract. We present a simple Data Mining Logic (DML) that can express common data mining tasks, like “Find Boolean association rules” or “Find inclusion dependencies.” At ...
Toon Calders, Jef Wijsen
RSCTC
2010
Springer
142views Fuzzy Logic» more  RSCTC 2010»
14 years 10 months ago
Learning from Imbalanced Data in Presence of Noisy and Borderline Examples
In this paper we studied re-sampling methods for learning classifiers from imbalanced data. We carried out a series of experiments on artificial data sets to explore the impact of ...
Krystyna Napierala, Jerzy Stefanowski, Szymon Wilk
83
Voted
CIE
2005
Springer
15 years 6 months ago
Towards Computability of Higher Type Continuous Data
Abstract. This paper extends the logical approach to computable analysis via Σ–definability to higher type continuous data such as functionals and operators. We employ definab...
Margarita V. Korovina, Oleg V. Kudinov