Sciweavers

1512 search results - page 195 / 303
» When Suboptimal Rules
Sort
View
VL
2009
IEEE
126views Visual Languages» more  VL 2009»
15 years 6 months ago
Predicting reuse of end-user web macro scripts
Repositories of code written by end-user programmers are beginning to emerge, but when a piece of code is new or nobody has yet reused it, then current repositories provide users ...
Christopher Scaffidi, Christopher Bogart, Margaret...
ICDM
2009
IEEE
109views Data Mining» more  ICDM 2009»
15 years 6 months ago
Finding Associations and Computing Similarity via Biased Pair Sampling
Sampling-based methods have previously been proposed for the problem of finding interesting associations in data, even for low-support items. While these methods do not guarantee ...
Andrea Campagna, Rasmus Pagh
EMMCVPR
2009
Springer
15 years 6 months ago
Boundaries as Contours of Optimal Appearance and Area of Support
7th International Conference on Energy Minimization Methods in Computer Vision and Pattern Recognition, Bonn, Germany, August 24-27, 2009 Bayesian boundary models often assume tha...
Christina Pavlopoulou, Stella X. Yu
FOCS
2007
IEEE
15 years 6 months ago
Round Complexity of Authenticated Broadcast with a Dishonest Majority
Broadcast among n parties in the presence of t ≥ n/3 malicious parties is possible only with some additional setup. The most common setup considered is the existence of a PKI an...
Juan A. Garay, Jonathan Katz, Chiu-Yuen Koo, Rafai...
GLOBECOM
2007
IEEE
15 years 6 months ago
A Simple Multiuser and Single-User Dual-Mode Downlink System with Limited Feedback
— Limited feedback systems that simultaneously transmit to multiple users are noise power limited at low SNR and interference power limited at high SNR. Specifically, there is a...
Chun Kin Au-Yeung, Seung Young Park, David James L...