Sciweavers

2230 search results - page 243 / 446
» Reformulating Constraint Models Using Input Data
Sort
View
SDM
2010
SIAM
256views Data Mining» more  SDM 2010»
15 years 4 months ago
The Application of Statistical Relational Learning to a Database of Criminal and Terrorist Activity
We apply statistical relational learning to a database of criminal and terrorist activity to predict attributes and event outcomes. The database stems from a collection of news ar...
B. Delaney, Andrew S. Fast, W. M. Campbell, C. J. ...
ICARIS
2004
Springer
15 years 8 months ago
A Fractal Immune Network
Proteins are the driving force in development (embryogenesis) and the immune system. Here we describe how a model of proteins designed for evolutionary development in computers can...
Peter J. Bentley, Jon Timmis
118
Voted
COLT
2006
Springer
15 years 7 months ago
Online Tracking of Linear Subspaces
We address the problem of online de-noising a stream of input points. We assume that the clean data is embedded in a linear subspace. We present two online algorithms for tracking ...
Koby Crammer
WSC
2007
15 years 5 months ago
Kernel estimation for quantile sensitivities
Quantiles, also known as value-at-risk in financial applications, are important measures of random performance. Quantile sensitivities provide information on how changes in the i...
Guangwu Liu, L. Jeff Hong
122
Voted
USENIX
2007
15 years 5 months ago
MapJAX: Data Structure Abstractions for Asynchronous Web Applications
Data Structure Abstractions for Asynchronous Web Applications Daniel S. Myers MIT CSAIL Jennifer N. Carlisle MIT CSAIL James A. Cowling MIT CSAIL Barbara H. Liskov MIT CSAIL The c...
Daniel S. Myers, Jennifer N. Carlisle, James A. Co...