Sciweavers

1474 search results - page 281 / 295
» Using Machine Learning to Focus Iterative Optimization
Sort
View
EDBT
2009
ACM
277views Database» more  EDBT 2009»
15 years 6 months ago
G-hash: towards fast kernel-based similarity search in large graph databases
Structured data including sets, sequences, trees and graphs, pose significant challenges to fundamental aspects of data management such as efficient storage, indexing, and simila...
Xiaohong Wang, Aaron M. Smalter, Jun Huan, Gerald ...
ICDM
2009
IEEE
172views Data Mining» more  ICDM 2009»
14 years 12 months ago
Evaluating Statistical Tests for Within-Network Classifiers of Relational Data
Recently a number of modeling techniques have been developed for data mining and machine learning in relational and network domains where the instances are not independent and ide...
Jennifer Neville, Brian Gallagher, Tina Eliassi-Ra...
ATAL
2009
Springer
15 years 8 months ago
Effective tag mechanisms for evolving cooperation
Certain observable features (tags), shared by a group of similar agents, can be used to signal intentions and can be effectively used to infer unobservable properties. Such infere...
Matthew Matlock, Sandip Sen
MM
2010
ACM
219views Multimedia» more  MM 2010»
15 years 2 months ago
A framework for photo-quality assessment and enhancement based on visual aesthetics
We present an interactive application that enables users to improve the visual aesthetics of their digital photographs using spatial recomposition. Unlike earlier work that focuse...
Subhabrata Bhattacharya, Rahul Sukthankar, Mubarak...
CCS
2004
ACM
15 years 7 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon