Sciweavers

485 search results - page 91 / 97
» Weighted Factorization
Sort
View
85
Voted
ACMSE
2005
ACM
15 years 4 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
IUI
2005
ACM
15 years 4 months ago
How to wreck a nice beach you sing calm incense
A principal problem in speech recognition is distinguishing between words and phrases that sound similar but have different meanings. Speech recognition programs produce a list of...
Henry Lieberman, Alexander Faaborg, Waseem Daher, ...
96
Voted
VISUALIZATION
1999
IEEE
15 years 3 months ago
Splatting Without the Blur
Splatting is a volume rendering algorithm that combines efficient volume projection with a sparse data representation: Only voxels that have values inside the iso-range need to be...
Klaus Mueller, Torsten Möller, Roger Crawfis
102
Voted
STOC
2010
ACM
269views Algorithms» more  STOC 2010»
15 years 3 months ago
Approximations for the Isoperimetric and Spectral Profile of Graphs and Related Parameters
The spectral profile of a graph is a natural generalization of the classical notion of its Rayleigh quotient. Roughly speaking, given a graph G, for each 0 < < 1, the spect...
Prasad Raghavendra, David Steurer and Prasad Tetal...
KDD
2010
ACM
252views Data Mining» more  KDD 2010»
15 years 2 months ago
Fast query execution for retrieval models based on path-constrained random walks
Many recommendation and retrieval tasks can be represented as proximity queries on a labeled directed graph, with typed nodes representing documents, terms, and metadata, and labe...
Ni Lao, William W. Cohen