Sciweavers

16843 search results - page 3241 / 3369
» On Generalized Authorization Problems
Sort
View
GECCO
2007
Springer
212views Optimization» more  GECCO 2007»
15 years 8 months ago
Controlling overfitting with multi-objective support vector machines
Recently, evolutionary computation has been successfully integrated into statistical learning methods. A Support Vector Machine (SVM) using evolution strategies for its optimizati...
Ingo Mierswa
EDBT
2009
ACM
134views Database» more  EDBT 2009»
15 years 8 months ago
Caching content-based queries for robust and efficient image retrieval
In order to become an effective complement to traditional Web-scale text-based image retrieval solutions, content-based image retrieval must address scalability and efficiency iss...
Fabrizio Falchi, Claudio Lucchese, Salvatore Orlan...
EDBT
2009
ACM
145views Database» more  EDBT 2009»
15 years 8 months ago
Efficient top-k count queries over imprecise duplicates
We propose efficient techniques for processing various TopK count queries on data with noisy duplicates. Our method differs from existing work on duplicate elimination in two sign...
Sunita Sarawagi, Vinay S. Deshpande, Sourabh Kasli...
131
Voted
GLVLSI
2007
IEEE
194views VLSI» more  GLVLSI 2007»
15 years 8 months ago
Probabilistic maximum error modeling for unreliable logic circuits
Reliability modeling and evaluation is expected to be one of the major issues in emerging nano-devices and beyond 22nm CMOS. Such devices would have inherent propensity for gate f...
Karthikeyan Lingasubramanian, Sanjukta Bhanja
GROUP
2007
ACM
15 years 8 months ago
Suitable notification intensity: the dynamic awareness system
Being aware of others' activities has played a vital role in the success of online collaboration. This resulted in the emergence of many groupware systems that provide users ...
Yao Wang, Wolfgang Gräther, Wolfgang Prinz
« Prev « First page 3241 / 3369 Last » Next »