Sciweavers

507 search results - page 48 / 102
» A simple role mining algorithm
Sort
View
CIDM
2009
IEEE
14 years 2 months ago
An architecture and algorithms for multi-run clustering
—This paper addresses two main challenges for clustering which require extensive human effort: selecting appropriate parameters for an arbitrary clustering algorithm and identify...
Rachsuda Jiamthapthaksin, Christoph F. Eick, Vadee...
TSP
2008
107views more  TSP 2008»
13 years 9 months ago
Time-Scale Modification of Speech Signals
This paper presents methods for independently modifying the time and pitch scale of acoustic signals, with an emphasis on speech signals. The algorithms developed here use paramet...
Brett Ninness, Soren J. Henriksen
DIS
2007
Springer
14 years 3 months ago
On Approximating Minimum Infrequent and Maximum Frequent Sets
The maximum cardinality of a frequent set as well as the minimum cardinality of an infrequent set are important characteristic numbers in frequent (item) set mining. Gunopulos et a...
Mario Boley
PKDD
2007
Springer
86views Data Mining» more  PKDD 2007»
14 years 3 months ago
An Effective Approach to Enhance Centroid Classifier for Text Categorization
Centroid Classifier has been shown to be a simple and yet effective method for text categorization. However, it is often plagued with model misfit (or inductive bias) incurred by i...
Songbo Tan, Xueqi Cheng
AAECC
2006
Springer
77views Algorithms» more  AAECC 2006»
13 years 9 months ago
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes...
Mihir Bellare, Adriana Palacio