Sciweavers

970 search results - page 56 / 194
» A comprehensive analysis of hyper-heuristics
Sort
View
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
11 years 10 months ago
Mining event periodicity from incomplete observations
Advanced technology in GPS and sensors enables us to track physical events, such as human movements and facility usage. Periodicity analysis from the recorded data is an important...
Zhenhui Li, Jingjing Wang, Jiawei Han
SDM
2012
SIAM
282views Data Mining» more  SDM 2012»
11 years 10 months ago
Citation Prediction in Heterogeneous Bibliographic Networks
To reveal information hiding in link space of bibliographical networks, link analysis has been studied from different perspectives in recent years. In this paper, we address a no...
Xiao Yu, Quanquan Gu, Mianwei Zhou, Jiawei Han
AI
2006
Springer
13 years 12 months ago
On the Performance of Chernoff-Distance-Based Linear Dimensionality Reduction Techniques
Abstract. We present a performance analysis of three linear dimensionality reduction techniques: Fisher's discriminant analysis (FDA), and two methods introduced recently base...
Mohammed Liakat Ali, Luis Rueda, Myriam Herrera
CORR
2011
Springer
198views Education» more  CORR 2011»
13 years 3 months ago
Kron Reduction of Graphs with Applications to Electrical Networks
Abstract. Consider a weighted and undirected graph, possibly with self-loops, and its corresponding Laplacian matrix, possibly augmented with additional diagonal elements correspon...
Florian Dörfler, Francesco Bullo
CCS
2011
ACM
12 years 8 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...