Sciweavers

480 search results - page 67 / 96
» Portrait: Generating Personal Presentations
Sort
View
KDD
2009
ACM
194views Data Mining» more  KDD 2009»
15 years 10 months ago
Combining link and content for community detection: a discriminative approach
In this paper, we consider the problem of combining link and content analysis for community detection from networked data, such as paper citation networks and Word Wide Web. Most ...
Tianbao Yang, Rong Jin, Yun Chi, Shenghuo Zhu
KDD
2009
ACM
206views Data Mining» more  KDD 2009»
15 years 10 months ago
Ranking-based clustering of heterogeneous information networks with star network schema
A heterogeneous information network is an information network composed of multiple types of objects. Clustering on such a network may lead to better understanding of both hidden s...
Yizhou Sun, Yintao Yu, Jiawei Han
CSCW
2006
ACM
15 years 3 months ago
Don't look stupid: avoiding pitfalls when recommending research papers
If recommenders are to help people be more productive, they need to support a wide variety of real-world information seeking tasks, such as those found when seeking research paper...
Sean M. McNee, Nishikant Kapoor, Joseph A. Konstan
87
Voted
GECCO
2004
Springer
137views Optimization» more  GECCO 2004»
15 years 3 months ago
Achieving Shorter Search Times in Voice Conversion Using Interactive Evolution
We have already proposed using evolutionary computation to adjust the voice quality conversion parameters, and we have reported that this approach produces results that are not onl...
Yuji Sato
CODES
2004
IEEE
15 years 1 months ago
Operation tables for scheduling in the presence of incomplete bypassing
Register bypassing is a powerful and widely used feature in modern processors to eliminate certain data hazards. Although complete bypassing is ideal for performance, bypassing ha...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...