Sciweavers

89222 search results - page 17583 / 17845
» Which
Sort
View
102
Voted
ICDM
2010
IEEE
115views Data Mining» more  ICDM 2010»
14 years 11 months ago
Polishing the Right Apple: Anytime Classification Also Benefits Data Streams with Constant Arrival Times
Classification of items taken from data streams requires algorithms that operate in time sensitive and computationally constrained environments. Often, the available time for class...
Jin Shieh, Eamonn J. Keogh
98
Voted
ICDM
2010
IEEE
146views Data Mining» more  ICDM 2010»
14 years 11 months ago
One-Class Matrix Completion with Low-Density Factorizations
Consider a typical recommendation problem. A company has historical records of products sold to a large customer base. These records may be compactly represented as a sparse custom...
Vikas Sindhwani, Serhat Selcuk Bucak, Jianying Hu,...
132
Voted
ICDM
2010
IEEE
205views Data Mining» more  ICDM 2010»
14 years 11 months ago
Knowledge File System -- A Principled Approach to Personal Information Management
The Knowledge File System (KFS) is a smart virtual file system that sits between the operating system and the file system. Its primary functionality is to automatically organize fi...
Kuiyu Chang, I. Wayan Tresna Perdana, Bramandia Ra...
122
Voted
ICDM
2010
IEEE
152views Data Mining» more  ICDM 2010»
14 years 11 months ago
Reviewer Profiling Using Sparse Matrix Regression
Thousands of scientific conferences happen every year, and each involves a laborious scientific peer review process conducted by one or more busy scientists serving as Technical/Sc...
Evangelos E. Papalexakis, Nicholas D. Sidiropoulos...
140
Voted
ICICS
2010
Springer
14 years 11 months ago
Compromise-Resilient Anti-jamming for Wireless Sensor Networks
Abstract. Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communic...
Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao
« Prev « First page 17583 / 17845 Last » Next »