Sciweavers

775 search results - page 140 / 155
» Behavioral Domain Analysis - The Application-Based Domain Mo...
Sort
View
PKDD
1999
Springer
272views Data Mining» more  PKDD 1999»
13 years 11 months ago
Handling Missing Data in Trees: Surrogate Splits or Statistical Imputation
Abstract. In many applications of data mining a - sometimes considerable - part of the data values is missing. This may occur because the data values were simply never entered into...
A. J. Feelders
EMSOFT
2008
Springer
13 years 9 months ago
Energy efficient streaming applications with guaranteed throughput on MPSoCs
In this paper we present a design space exploration flow to achieve energy efficiency for streaming applications on MPSoCs while meeting the specified throughput constraints. The ...
Jun Zhu, Ingo Sander, Axel Jantsch
ICDM
2010
IEEE
193views Data Mining» more  ICDM 2010»
13 years 5 months ago
Supervised Link Prediction Using Multiple Sources
Link prediction is a fundamental problem in social network analysis and modern-day commercial applications such as Facebook and Myspace. Most existing research approaches this pro...
Zhengdong Lu, Berkant Savas, Wei Tang, Inderjit S....
JCS
2011
91views more  JCS 2011»
13 years 2 months ago
A framework for analyzing RFID distance bounding protocols
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which lead...
Gildas Avoine, Muhammed Ali Bingöl, Süle...
CIKM
2009
Springer
14 years 2 months ago
Reducing the risk of query expansion via robust constrained optimization
We introduce a new theoretical derivation, evaluation methods, and extensive empirical analysis for an automatic query expansion framework in which model estimation is cast as a r...
Kevyn Collins-Thompson