Sciweavers

1015 search results - page 69 / 203
» On Information Regularization
Sort
View
CLEF
2010
Springer
15 years 6 months ago
ZOT! to Wikipedia Vandalism - Lab Report for PAN at CLEF 2010
Abstract This vandalism detector uses features primarily derived from a wordpreserving differencing of the text for each Wikipedia article from before and after the edit, along wit...
James White, Rebecca Maessen
124
Voted
ICASSP
2010
IEEE
15 years 5 months ago
Optimal delayed decoding of predictively encoded sources
Predictive coding eliminates redundancy due to correlations between the current and past signal samples, so that only the innovation, or prediction residual, needs to be encoded. ...
Vinay Melkote, Kenneth Rose
KES
2008
Springer
15 years 5 months ago
Driven by Compression Progress
I argue that data becomes temporarily interesting by itself to some self-improving, but computationally limited, subjective observer once he learns to predict or compress the data...
Jürgen Schmidhuber
INFOCOM
2011
IEEE
14 years 8 months ago
Hidden communication in P2P networks Steganographic handshake and broadcast
—We consider the question of how a conspiring subgroup of peers in a p2p network can find each other and communicate without provoking suspicion among regular peers or an author...
Raphael Eidenbenz, Thomas Locher, Roger Wattenhofe...
SDM
2012
SIAM
307views Data Mining» more  SDM 2012»
13 years 7 months ago
Pseudo Cold Start Link Prediction with Multiple Sources in Social Networks
Link prediction is an important task in social networks and data mining for understanding the mechanisms by which the social networks form and evolve. In most link prediction rese...
Liang Ge, Aidong Zhang