Sciweavers

3556 search results - page 699 / 712
» Can machine learning be secure
Sort
View
WKDD
2010
CPS
204views Data Mining» more  WKDD 2010»
14 years 29 days ago
A Scalable, Accurate Hybrid Recommender System
—Recommender systems apply machine learning techniques for filtering unseen information and can predict whether a user would like a given resource. There are three main types of...
Mustansar Ali Ghazanfar, Adam Prügel-Bennett
CIKM
2003
Springer
14 years 26 days ago
Categorizing web queries according to geographical locality
Web pages (and resources, in general) can be characterized according to their geographical locality. For example, a web page with general information about wildflowers could be c...
Luis Gravano, Vasileios Hatzivassiloglou, Richard ...
PLDI
2010
ACM
14 years 22 days ago
Green: a framework for supporting energy-conscious programming using controlled approximation
Energy-efficient computing is important in several systems ranging from embedded devices to large scale data centers. Several application domains offer the opportunity to tradeof...
Woongki Baek, Trishul M. Chilimbi
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
14 years 14 days ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
GECCO
2010
Springer
191views Optimization» more  GECCO 2010»
14 years 13 days ago
Initialization parameter sweep in ATHENA: optimizing neural networks for detecting gene-gene interactions in the presence of sma
Recent advances in genotyping technology have led to the generation of an enormous quantity of genetic data. Traditional methods of statistical analysis have proved insufficient i...
Emily Rose Holzinger, Carrie C. Buchanan, Scott M....