Sciweavers

2111 search results - page 207 / 423
» Understanding the Yarowsky Algorithm
Sort
View
126
Voted
ICSE
2010
IEEE-ACM
15 years 15 days ago
Identifying crosscutting concerns using historical code changes
Detailed knowledge about implemented concerns in the source code is crucial for the cost-effective maintenance and successful evolution of large systems. Concern mining techniques...
Bram Adams, Zhen Ming Jiang, Ahmed E. Hassan
IHI
2012
217views Healthcare» more  IHI 2012»
13 years 10 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
144
Voted
SIGMOD
2012
ACM
190views Database» more  SIGMOD 2012»
13 years 5 months ago
Sample-driven schema mapping
End-users increasingly find the need to perform light-weight, customized schema mapping. State-of-the-art tools provide powerful functions to generate schema mappings, but they u...
Li Qian, Michael J. Cafarella, H. V. Jagadish
149
Voted
KDD
2012
ACM
221views Data Mining» more  KDD 2012»
13 years 5 months ago
Fast mining and forecasting of complex time-stamped events
Given huge collections of time-evolving events such as web-click logs, which consist of multiple attributes (e.g., URL, userID, timestamp), how do we find patterns and trends? Ho...
Yasuko Matsubara, Yasushi Sakurai, Christos Falout...
196
Voted
CVPR
2012
IEEE
13 years 5 months ago
A learning-based framework for depth ordering
Depth ordering is instrumental for understanding the 3D geometry of an image. We as humans are surprisingly good ordering even with abstract 2D line drawings. In this paper we pro...
Zhaoyin Jia, Andrew C. Gallagher, Yao-Jen Chang, T...