Sciweavers

1486 search results - page 265 / 298
» Algorithms for two-box covering
Sort
View
WWW
2006
ACM
14 years 9 months ago
Topical TrustRank: using topicality to combat web spam
Web spam is behavior that attempts to deceive search engine ranking algorithms. TrustRank is a recent algorithm that can combat web spam. However, TrustRank is vulnerable in the s...
Baoning Wu, Vinay Goel, Brian D. Davison
KDD
2008
ACM
140views Data Mining» more  KDD 2008»
14 years 8 months ago
Semi-supervised approach to rapid and reliable labeling of large data sets
Supervised classification methods have been shown to be very effective for a large number of applications. They require a training data set whose instances are labeled to indicate...
György J. Simon, Vipin Kumar, Zhi-Li Zhang
STOC
2004
ACM
150views Algorithms» more  STOC 2004»
14 years 8 months ago
Typical properties of winners and losers in discrete optimization
We present a probabilistic analysis for a large class of combinatorial optimization problems containing, e.g., all binary optimization problems defined by linear constraints and a...
René Beier, Berthold Vöcking
ICRA
2009
IEEE
275views Robotics» more  ICRA 2009»
14 years 3 months ago
Real-time monocular visual odometry for on-road vehicles with 1-point RANSAC
— This paper presents a system capable of recovering the trajectory of a vehicle from the video input of a single camera at a very high frame-rate. The overall frame-rate is limi...
Davide Scaramuzza, Friedrich Fraundorfer, Roland S...
CIKM
2009
Springer
14 years 3 months ago
A general markov framework for page importance computation
We propose a General Markov Framework for computing page importance. Under the framework, a Markov Skeleton Process is used to model the random walk conducted by the web surfer on...
Bin Gao, Tie-Yan Liu, Zhiming Ma, Taifeng Wang, Ha...