Sciweavers

1595 search results - page 277 / 319
» A hierarchical clustering algorithm based on the Hungarian m...
Sort
View
SAC
2010
ACM
14 years 3 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
ICSE
2012
IEEE-ACM
12 years 18 days ago
Synthesizing API usage examples
Abstract—Key program interfaces are sometimes documented with usage examples: concrete code snippets that characterize common use cases for a particular data type. While such doc...
Raymond P. L. Buse, Westley Weimer
ICIP
2004
IEEE
14 years 11 months ago
Stochastic modeling of volume images with a 3-d hidden markov model
Over the years, researchers in the image analysis community have successfully used various statistical modeling methods to segment, classify, and annotate digital images. In this ...
Jia Li, Dhiraj Joshi, James Ze Wang
ICPR
2000
IEEE
14 years 11 months ago
On Gaussian Radial Basis Function Approximations: Interpretation, Extensions, and Learning Strategies
In this paper we focus on an interpretation of Gaussian radial basis functions (GRBF) which motivates extensions and learning strategies. Specifically, we show that GRBF regressio...
Mário A. T. Figueiredo
WWW
2004
ACM
14 years 11 months ago
Distributed community crawling
The massive distribution of the crawling task can lead to inefficient exploration of the same portion of the Web. We propose a technique to guide crawlers exploration based on the...
Fabrizio Costa, Paolo Frasconi