Sciweavers

11211 search results - page 1761 / 2243
» Rank-Sensitive Data Structures
Sort
View
SCAI
2008
15 years 6 months ago
Modeling Habituation in the Cnidarian Hydra
Abstract. In the design of behavior-based control architectures for robots it is common to use biology as inspiration, and often the observed functionalities of insect behaviors ar...
Malin Aktius, Mats Nordahl, Tom Ziemke
SDM
2008
SIAM
140views Data Mining» more  SDM 2008»
15 years 6 months ago
Creating a Cluster Hierarchy under Constraints of a Partially Known Hierarchy
Although clustering under constraints is a current research topic, a hierarchical setting, in which a hierarchy of clusters is the goal, is usually not considered. This paper trie...
Korinna Bade, Andreas Nürnberger
SICHERHEIT
2008
15 years 6 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
UAI
2008
15 years 6 months ago
Flexible Priors for Exemplar-based Clustering
Exemplar-based clustering methods have been shown to produce state-of-the-art results on a number of synthetic and real-world clustering problems. They are appealing because they ...
Daniel Tarlow, Richard S. Zemel, Brendan J. Frey
SDM
2007
SIAM
143views Data Mining» more  SDM 2007»
15 years 6 months ago
Patterns of Cascading Behavior in Large Blog Graphs
How do blogs cite and influence each other? How do such links evolve? Does the popularity of old blog posts drop exponentially with time? These are some of the questions that we ...
Jure Leskovec, Mary McGlohon, Christos Faloutsos, ...
« Prev « First page 1761 / 2243 Last » Next »