Sciweavers

7918 search results - page 1417 / 1584
» Model Composition Directives
Sort
View
JCM
2010
126views more  JCM 2010»
15 years 1 months ago
Adding Redundancy to Replication in Window-aware Delay-tolerant Routing
— This paper presents a resource-efficient protocol for opportunistic routing in delay-tolerant networks (DTN). First, our approach exploits the context of mobile nodes (speed, ...
Gabriel Sandulescu, Simin Nadjm-Tehrani
154
Voted
JMLR
2010
143views more  JMLR 2010»
15 years 1 months ago
A Quasi-Newton Approach to Nonsmooth Convex Optimization Problems in Machine Learning
We extend the well-known BFGS quasi-Newton method and its memory-limited variant LBFGS to the optimization of nonsmooth convex objectives. This is done in a rigorous fashion by ge...
Jin Yu, S. V. N. Vishwanathan, Simon Günter, ...
JUCS
2010
98views more  JUCS 2010»
15 years 1 months ago
Toward an Understanding of the Mediating Role of "Trust" in Mobile Banking Service: An Empirical Test of Indonesia Case
: Mobile banking has been considered to be one of the most value-added and important mobile services currently available. Considering the fact that the penetration of this technolo...
Chulmo Koo, Yulia Wati
MTA
2010
101views more  MTA 2010»
15 years 1 months ago
Enquiring MPEG-7 based multimedia ontologies
Machine understandable metadata forms the main prerequisite for the intelligent services envisaged in a Web, which going beyond mere data exchange and provides for effective conten...
Stamatia Dasiopoulou, Vassilis Tzouvaras, Ioannis ...
PKDD
2010
Springer
128views Data Mining» more  PKDD 2010»
15 years 1 months ago
Learning to Tag from Open Vocabulary Labels
Most approaches to classifying media content assume a fixed, closed vocabulary of labels. In contrast, we advocate machine learning approaches which take advantage of the millions...
Edith Law, Burr Settles, Tom M. Mitchell
« Prev « First page 1417 / 1584 Last » Next »