Sciweavers

4636 search results - page 893 / 928
» Application of Linguistic Techniques for Use Case Analysis
Sort
View
JMLR
2002
137views more  JMLR 2002»
13 years 10 months ago
The Subspace Information Criterion for Infinite Dimensional Hypothesis Spaces
A central problem in learning is selection of an appropriate model. This is typically done by estimating the unknown generalization errors of a set of models to be selected from a...
Masashi Sugiyama, Klaus-Robert Müller
WWW
2011
ACM
13 years 5 months ago
Network bucket testing
Bucket testing, also known as A/B testing, is a practice that is widely used by on-line sites with large audiences: in a simple version of the methodology, one evaluates a new fea...
Lars Backstrom, Jon M. Kleinberg
DAC
2003
ACM
14 years 12 months ago
A cost-driven lithographic correction methodology based on off-the-shelf sizing tools
As minimum feature sizes continue to shrink, patterned features have become significantly smaller than the wavelength of light used in optical lithography. As a result, the requir...
Puneet Gupta, Andrew B. Kahng, Dennis Sylvester, J...
VLDB
2007
ACM
111views Database» more  VLDB 2007»
14 years 5 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
KDD
2005
ACM
103views Data Mining» more  KDD 2005»
14 years 4 months ago
Key semantics extraction by dependency tree mining
We propose a new text mining system which extracts characteristic contents from given documents. We define Key semantics as characteristic sub-structures of syntactic dependencie...
Satoshi Morinaga, Hiroki Arimura, Takahiro Ikeda, ...