Sciweavers

885 search results - page 147 / 177
» Random Matrices in Data Analysis
Sort
View
107
Voted
KDD
2008
ACM
128views Data Mining» more  KDD 2008»
16 years 2 months ago
Bypass rates: reducing query abandonment using negative inferences
We introduce a new approach to analyzing click logs by examining both the documents that are clicked and those that are bypassed--documents returned higher in the ordering of the ...
Atish Das Sarma, Sreenivas Gollapudi, Samuel Ieong
CSE
2009
IEEE
15 years 8 months ago
Noise Injection for Search Privacy Protection
Abstract—Extensive work has been devoted to private information retrieval and privacy preserving data mining. To protect user privacy from search engines, however, most current a...
Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Ch...
121
Voted
WCNC
2008
IEEE
15 years 8 months ago
A Closed-Form Approximation for Capacity of Multiuser MIMO Broadcast Systems: A Virtual User Approach
— Besides delivering high data rates in a point-to-point scenario, multi-input multi-output (MIMO) antenna techniques can broadcast personalized data to multiple users in the poi...
Li-Chun Wang, Chu-Jung Yeh, Chi-Fang Li
115
Voted
ICCVW
1999
Springer
15 years 6 months ago
A General Method for Feature Matching and Model Extraction
Abstract. Popular algorithms for feature matching and model extraction fall into two broad categories, generate-and-test and Hough transform variations. However, both methods su er...
Clark F. Olson
CONEXT
2007
ACM
15 years 5 months ago
The diameter of opportunistic mobile networks
Portable devices have more data storage and increasing communication capabilities everyday. In addition to classic infrastructure based communication, these devices can exploit hu...
Augustin Chaintreau, Abderrahmen Mtibaa, Laurent M...