Sciweavers

9631 search results - page 1896 / 1927
» The Costs of Using JXTA
Sort
View
ACSW
2006
15 years 1 months ago
Catching spam before it arrives: domain specific dynamic blacklists
1 The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasin...
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel...
DGO
2006
134views Education» more  DGO 2006»
15 years 1 months ago
Next steps in near-duplicate detection for eRulemaking
Large volume public comment campaigns and web portals that encourage the public to customize form letters produce many near-duplicate documents, which increases processing and sto...
Hui Yang, Jamie Callan, Stuart W. Shulman
SDM
2004
SIAM
141views Data Mining» more  SDM 2004»
15 years 1 months ago
Active Mining of Data Streams
Most previously proposed mining methods on data streams make an unrealistic assumption that "labelled" data stream is readily available and can be mined at anytime. Howe...
Wei Fan, Yi-an Huang, Haixun Wang, Philip S. Yu
IJCAI
2003
15 years 1 months ago
A Planning Algorithm for Predictive State Representations
We address the problem of optimally controlling stochastic environments that are partially observable. The standard method for tackling such problems is to define and solve a Part...
Masoumeh T. Izadi, Doina Precup
PICS
2003
15 years 1 months ago
Error-Diffusion Robust to Mis-Registration in Multi-Pass Printing
Error-diffusion and its variants are commonly used halftoning techniques that produce dispersed dot (FM) halftones, which are often preferred because they are free from low-freque...
Zhigang Fan, Gaurav Sharma, Shen-ge Wang
« Prev « First page 1896 / 1927 Last » Next »