Traditional feature selection methods assume that the data are independent and identically distributed (i.i.d.). In real world, tremendous amounts of data are distributed in a net...
Mining subtopics from weblogs and analyzing their spatiotemporal patterns have applications in multiple domains. In this paper, we define the novel problem of mining spatiotempora...
Qiaozhu Mei, Chao Liu 0001, Hang Su, ChengXiang Zh...
—Cooperative jamming (CJ) schemes support secure wireless communication in the presence of one or more eavesdroppers. Larger numbers of cooperative relays provide better secrecy ...
Shuangyu Luo, Hana Godrich, Athina P. Petropulu, H...
Multi-class classification schemes typically require human input in the form of precise category names or numbers for each example to be annotated – providing this can be impra...
Ajay Joshi, Fatih Porikli, Nikolaos Papanikolopoul...
Current methods for selectivity estimation fall into two broad categories, synopsis-based and sampling-based. Synopsis-based methods, such as histograms, incur minimal overhead at ...