Sciweavers

1377 search results - page 212 / 276
» On the Generation of Spatiotemporal Datasets
Sort
View
SIGMOD
2010
ACM
239views Database» more  SIGMOD 2010»
15 years 3 months ago
Computing label-constraint reachability in graph databases
Our world today is generating huge amounts of graph data such as social networks, biological networks, and the semantic web. Many of these real-world graphs are edge-labeled graph...
Ruoming Jin, Hui Hong, Haixun Wang, Ning Ruan, Yan...
80
Voted
PAKDD
2010
ACM
172views Data Mining» more  PAKDD 2010»
15 years 3 months ago
Semi-supervised Tag Recommendation - Using Untagged Resources to Mitigate Cold-Start Problems
Tag recommender systems are often used in social tagging systems, a popular family of Web 2.0 applications, to assist users in the tagging process. But in cold-start situations i.e...
Christine Preisach, Leandro Balby Marinho, Lars Sc...
CVPR
2010
IEEE
15 years 3 months ago
Object Recognition as Ranking Holistic Figure-Ground Hypotheses
We present an approach to visual object-class recognition and segmentation based on a pipeline that combines multiple, holistic figure-ground hypotheses generated in a bottom-up,...
Fuxin Li, JoãCarreira, Cristian Sminchisescu
EDBT
2009
ACM
110views Database» more  EDBT 2009»
15 years 3 months ago
A sampling approach for XML query selectivity estimation
As the Extensible Markup Language (XML) rapidly establishes itself as the de facto standard for presenting, storing, and exchanging data on the Internet, large volume of XML data ...
Cheng Luo, Zhewei Jiang, Wen-Chi Hou, Feng Yu, Qia...
96
Voted
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
15 years 3 months ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classi...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...