Sciweavers

259 search results - page 46 / 52
» Underdetermined Source Separation with Structured Source Pri...
Sort
View
PVLDB
2008
122views more  PVLDB 2008»
14 years 11 months ago
Exploiting shared correlations in probabilistic databases
There has been a recent surge in work in probabilistic databases, propelled in large part by the huge increase in noisy data sources -from sensor data, experimental data, data fro...
Prithviraj Sen, Amol Deshpande, Lise Getoor
WSDM
2012
ACM
207views Data Mining» more  WSDM 2012»
13 years 7 months ago
Sequence clustering and labeling for unsupervised query intent discovery
One popular form of semantic search observed in several modern search engines is to recognize query patterns that trigger instant answers or domain-specific search, producing sem...
Jackie Chi Kit Cheung, Xiao Li
83
Voted
VLDB
2000
ACM
133views Database» more  VLDB 2000»
15 years 3 months ago
Memex: A Browsing Assistant for Collaborative Archiving and Mining of Surf Trails
Keyword indices, topic directories, and link-based rankings are used to search and structure the rapidly growing Web today. Surprisingly little use is made of years of browsing ex...
Soumen Chakrabarti, Sandeep Srivastava, Mallela Su...
90
Voted
SYMMETRY
2010
109views more  SYMMETRY 2010»
14 years 6 months ago
Asymmetry and Symmetry in the Beauty of Human Faces
: The emphasis in the published literature has mostly been on symmetry as the critical source for beauty judgment. In fact, both symmetry and asymmetry serve as highly aesthetic so...
Dahlia W. Zaidel, Marjan Hessamian
87
Voted
DIM
2008
ACM
15 years 1 months ago
Minimal information disclosure with efficiently verifiable credentials
Public-key based certificates provide a standard way to prove one's identity, as attested by some certificate authority (CA). However, plain certificates provide a binary ide...
David Bauer, Douglas M. Blough, David Cash