Sciweavers

2061 search results - page 208 / 413
» Authorization for Metacomputing Applications
Sort
View
140
Voted
BNCOD
2007
96views Database» more  BNCOD 2007»
15 years 6 months ago
Extracting Temporal Information from Short Messages
Abstract. Information Extraction, the process of eliciting data from natural language documents, usually relies on the ability to parse the document and then to detect the meaning ...
Richard Cooper, Sinclair Manson
KDD
2003
ACM
99views Data Mining» more  KDD 2003»
16 years 5 months ago
Fragments of order
High-dimensional collections of 0-1 data occur in many applications. The attributes in such data sets are typically considered to be unordered. However, in many cases there is a n...
Aristides Gionis, Teija Kujala, Heikki Mannila
KDD
2002
ACM
147views Data Mining» more  KDD 2002»
16 years 5 months ago
Sequential cost-sensitive decision making with reinforcement learning
Recently, there has been increasing interest in the issues of cost-sensitive learning and decision making in a variety of applications of data mining. A number of approaches have ...
Edwin P. D. Pednault, Naoki Abe, Bianca Zadrozny
CHI
2007
ACM
16 years 5 months ago
Why we tag: motivations for annotation in mobile and online media
Why do people tag? Users have mostly avoided annotating media such as photos ? both in desktop and mobile environments ? despite the many potential uses for annotations, including...
Morgan Ames, Mor Naaman
SDM
2009
SIAM
180views Data Mining» more  SDM 2009»
16 years 1 months ago
Hierarchical Linear Discriminant Analysis for Beamforming.
This paper demonstrates the applicability of the recently proposed supervised dimension reduction, hierarchical linear discriminant analysis (h-LDA) to a well-known spatial locali...
Barry L. Drake, Haesun Park, Jaegul Choo