Sciweavers

554 search results - page 100 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
ICSE
2012
IEEE-ACM
11 years 11 months ago
What make long term contributors: Willingness and opportunity in OSS community
—To survive and succeed, software projects need to attract and retain contributors. We model the individual’s chances to become a valuable contributor through her capacity, wil...
Minghui Zhou, Audris Mockus
ICCV
2009
IEEE
15 years 1 months ago
Efficient subset selection based on the Renyi entropy
Many machine learning algorithms require the summation of Gaussian kernel functions, an expensive operation if implemented straightforwardly. Several methods have been proposed t...
Vlad I. Morariu1, Balaji V. Srinivasan, Vikas C. R...
NIPS
2008
13 years 10 months ago
Automatic online tuning for fast Gaussian summation
Many machine learning algorithms require the summation of Gaussian kernel functions, an expensive operation if implemented straightforwardly. Several methods have been proposed to...
Vlad I. Morariu, Balaji Vasan Srinivasan, Vikas C....
BMCBI
2008
173views more  BMCBI 2008»
13 years 8 months ago
Extraction of semantic biomedical relations from text using conditional random fields
Background: The increasing amount of published literature in biomedicine represents an immense source of knowledge, which can only efficiently be accessed by a new generation of a...
Markus Bundschus, Mathäus Dejori, Martin Stet...
VLDB
2007
ACM
94views Database» more  VLDB 2007»
14 years 2 months ago
iTrails: Pay-as-you-go Information Integration in Dataspaces
Dataspace management has been recently identified as a new agenda for information management [17, 22] and information integration [23]. In sharp contrast to standard information ...
Marcos Antonio Vaz Salles, Jens-Peter Dittrich, Sh...