Sciweavers

11328 search results - page 2099 / 2266
» Timed Branching Processes
Sort
View
125
Voted
MOBIHOC
2009
ACM
16 years 4 months ago
Secure multidimensional range queries in sensor networks
Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor node...
Rui Zhang, Jing Shi, Yanchao Zhang
KDD
2008
ACM
178views Data Mining» more  KDD 2008»
16 years 3 months ago
Training structural svms with kernels using sampled cuts
Discriminative training for structured outputs has found increasing applications in areas such as natural language processing, bioinformatics, information retrieval, and computer ...
Chun-Nam John Yu, Thorsten Joachims
126
Voted
KDD
2008
ACM
148views Data Mining» more  KDD 2008»
16 years 3 months ago
Get another label? improving data quality and data mining using multiple, noisy labelers
This paper addresses the repeated acquisition of labels for data items when the labeling is imperfect. We examine the improvement (or lack thereof) in data quality via repeated la...
Victor S. Sheng, Foster J. Provost, Panagiotis G. ...
KDD
2008
ACM
183views Data Mining» more  KDD 2008»
16 years 3 months ago
De-duping URLs via rewrite rules
A large fraction of the URLs on the web contain duplicate (or near-duplicate) content. De-duping URLs is an extremely important problem for search engines, since all the principal...
Anirban Dasgupta, Ravi Kumar, Amit Sasturkar
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
16 years 3 months ago
Single-pass online learning: performance, voting schemes and online feature selection
To learn concepts over massive data streams, it is essential to design inference and learning methods that operate in real time with limited memory. Online learning methods such a...
Vitor R. Carvalho, William W. Cohen
« Prev « First page 2099 / 2266 Last » Next »